kudelskisecurity / fumblechain
A Purposefully Vulnerable Blockchain
☆50Updated 3 years ago
Alternatives and similar repositories for fumblechain:
Users that are interested in fumblechain are comparing it to the libraries listed below
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆118Updated 6 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 2 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- Red Team Resources☆59Updated 6 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆147Updated last year
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆31Updated 8 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated 2 years ago
- Solidity Contract Function Profiler☆82Updated 6 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 5 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- In service of posteriority☆45Updated 2 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 6 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- Security issues in Ethereum demonstrated in mocha tests. The fix is also demonstrated☆141Updated last year
- Geolocate your files!☆16Updated 3 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆28Updated 5 years ago
- ☆31Updated 6 years ago
- BlockChain-Security-List☆102Updated 6 years ago
- Tool for auditing Ethereum contracts☆55Updated 7 years ago