kudelskisecurity / fumblechain
A Purposefully Vulnerable Blockchain
☆50Updated 3 years ago
Alternatives and similar repositories for fumblechain:
Users that are interested in fumblechain are comparing it to the libraries listed below
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆118Updated 6 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 7 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆32Updated 9 months ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- In service of posteriority☆45Updated 2 years ago
- Solidity Contract Function Profiler☆82Updated 6 years ago
- The Trail of Bits Truffle Security Toolbox☆24Updated last year
- ☆38Updated 3 years ago
- CLI client for the MythX API☆20Updated 2 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated 2 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago