Example Ethereum Solidity Contracts
☆30Jan 14, 2019Updated 7 years ago
Alternatives and similar repositories for solidity-examples
Users that are interested in solidity-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code samples for the Modern JS workshop☆25Mar 20, 2019Updated 7 years ago
- Course content for Practical AI on the Google Cloud Platform☆11Aug 4, 2020Updated 5 years ago
- Software resources for two Safari presentations: (1) Object Oriented GUI design in Java; (2) Design Patterns in Java GUI Development☆10Oct 5, 2021Updated 4 years ago
- Training materials for O'Reilly☆24Mar 5, 2019Updated 7 years ago
- O'Reilly Scala Programming Fundamentals: Methods, Classes, Traits☆13Jul 16, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simplify your frontend development workflow and enhance the user experience of your applications with React☆13Sep 19, 2018Updated 7 years ago
- Experiments with D3.js☆17Aug 27, 2017Updated 8 years ago
- Docs for Creating a Deployment Pipeline with Jenkins training☆20Nov 4, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- ☆15May 23, 2019Updated 6 years ago
- ☆14Mar 8, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆12May 9, 2017Updated 8 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Safe password hashing.☆18Jun 16, 2021Updated 4 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- ☆15Jan 31, 2018Updated 8 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago