Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Collection of Helm charts that developed by the BeeInventor.☆10Feb 20, 2025Updated last year
- ☆15Oct 14, 2019Updated 6 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- A mempool listener for contract specific transactions.☆13Aug 19, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A curated list of my GitHub stars☆15Mar 14, 2025Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- Website for ETHBerlin 3☆14Feb 12, 2026Updated last month
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- two jupyter notebooks showing what could go wrong with nonces☆13Jan 4, 2019Updated 7 years ago
- A brute force, heuristics, stadistical and down the hill solution to solve enigma msg by KPA. ( mirror from https://code.haibane.org/cap…☆13Oct 2, 2021Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Mar 11, 2026Updated last month
- ☆14Dec 24, 2023Updated 2 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Dec 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Web accessible Ardour inside an Arch Container☆15Updated this week
- Terminal CryptoDeepTech for Google Colab☆31Jan 28, 2026Updated 2 months ago
- ☆11May 22, 2022Updated 3 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- elliptic curve illustrations☆17May 27, 2022Updated 3 years ago
- TRON (TRX) ADDRESS and Private Key Wallet Generated and Cracked with Check From List Data with TRONAPI☆12Nov 21, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- music platform☆28Mar 25, 2026Updated 2 weeks ago
- privilege escalation POCs built in Rust.☆20Jun 30, 2022Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆47Dec 5, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Elliptic curve mathematics including Tate and Weil pairings for BLS signatures and zk-SNARK algorithms.☆20Feb 24, 2025Updated last year
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year