demining / Blockchain-Attack-Vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
☆26Updated 2 years ago
Alternatives and similar repositories for Blockchain-Attack-Vectors:
Users that are interested in Blockchain-Attack-Vectors are comparing it to the libraries listed below
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆15Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆89Updated 2 months ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆14Updated 2 years ago
- ECDSA nonce-reuse attack to recover a private key.☆49Updated 4 years ago
- Scripts used in Blockchain Exploitation Blog☆40Updated 11 months ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Updated 2 years ago
- A tool for checking BigSpender vulnerability in your Bitcoin wallet☆40Updated 4 years ago
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆91Updated 2 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆65Updated last year
- This bot can be used to auto withdraw balance.☆12Updated 2 years ago
- ☆52Updated last year
- No api requried & faster than ever☆22Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆99Updated 6 years ago
- My Blockchain auditing service☆22Updated last month
- Speed up secp256k1 with endomorphism☆13Updated 2 years ago
- Reproduce DeFi hack incidents and collections of security-related issues.☆11Updated 2 years ago
- A collection of BlockChain Solidity Smart Contracts: Building, Security & Exploits. Also exploring Cryptography (RSA, ECC) from Scratch.☆20Updated 4 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Updated 3 years ago
- All of my CTF(THM, HTB, pentesterlab, vulnhub etc.) wirte-ups & notes☆21Updated 10 months ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- A tool to visually generate a private key and address with automatic balance and activity check across several EVM-compatible blockchains☆42Updated last month
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆24Updated 3 years ago
- A framework for assessing the security of L2s☆46Updated last year
- Collection of CTFs for Fun and Interviewing Applicants☆138Updated last month
- ☆35Updated last year
- Tool to hack a vanity address generated with Profanity☆135Updated last year
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated 11 months ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆12Updated 2 years ago