Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 31, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Collection of Helm charts that developed by the BeeInventor.☆10Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Jul 31, 2024Updated last year
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Website for ETHBerlin 3☆14Feb 12, 2026Updated 2 months ago
- two jupyter notebooks showing what could go wrong with nonces☆13Jan 4, 2019Updated 7 years ago
- A brute force, heuristics, stadistical and down the hill solution to solve enigma msg by KPA. ( mirror from https://code.haibane.org/cap…☆13Oct 2, 2021Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆19Apr 14, 2023Updated 3 years ago
- zimbra "zmslapd" lpe☆23Oct 27, 2021Updated 4 years ago
- ☆13Dec 24, 2023Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Dec 7, 2022Updated 3 years ago
- to show pocs found☆10Jul 16, 2025Updated 9 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Apr 25, 2022Updated 4 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆30Dec 7, 2022Updated 3 years ago
- ☆11May 22, 2022Updated 3 years ago
- A type-safe way to emulate tail-call optimization with trampolines☆20Oct 20, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- IPTV application for Amazon FireTV devices☆16Apr 6, 2026Updated 3 weeks ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆84Feb 6, 2024Updated 2 years ago
- TRON (TRX) ADDRESS and Private Key Wallet Generated and Cracked with Check From List Data with TRONAPI☆12Nov 21, 2022Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆13Apr 22, 2026Updated last week