learnerLj / MaskCrackerLinks
A testing tool to assess the security of your Metamask wallet by reproducing real-world attack scenarios.
☆22Updated 6 months ago
Alternatives and similar repositories for MaskCracker
Users that are interested in MaskCracker are comparing it to the libraries listed below
Sorting:
- SlowMist's open - sourced guide for Web3 projects. It details security practices across development, release, operation, and incident res…☆323Updated 5 months ago
- Extremely Fast Contract Defect Detectors☆13Updated last year
- Collect CTFs related to evm, and provide solutions, using Foundry. 收集 EVM 类的 CTF 挑战,并提供解决方案。☆155Updated last year
- ☆249Updated 5 months ago
- ☆20Updated last year
- Analyze and reproduce attack events or vulnerabilities in the blockchain world.☆351Updated 3 years ago
- ☆39Updated 2 years ago
- ☆37Updated 5 months ago
- ☆28Updated 5 months ago
- 加密资产安全解决方案 Cryptocurrency Security Solution☆227Updated 5 months ago
- Walrus 共学☆15Updated 9 months ago
- Web3 CTF Intensive CoLearning☆148Updated 2 weeks ago
- Ethernaut Motorbike Solution (After Dencun Upgrade)☆10Updated last month
- 《区块链安全入门与实战》☆88Updated 4 years ago
- Vulnerabilities in some blockchain projects and there exploits☆47Updated 2 years ago
- Static Analyzer for Solidity base on Slither.☆30Updated last year
- BlockChain Security☆26Updated 4 years ago
- This repository contains a list of the most popular and widely used tools in web3 security. If you find any tools missing, you can create…☆444Updated last year
- ☆13Updated 6 years ago
- ☆12Updated 3 months ago
- ☆13Updated 2 years ago
- ☆144Updated 3 months ago
- An all-in-one Ethereum SDK and command-line tool written in python.☆80Updated last month
- SolidCTF is an infrastructure solution that simplifies the build of Solidity CTF challenges.☆154Updated 2 years ago
- This Repository contains list of Common NFT Attack Vectors. If you find any attack vectors missing, you can create a pull request and be …☆273Updated 9 months ago
- Finds matching solidity function signatures for a given 4 byte signature hash and arguments.☆20Updated 3 years ago
- watch evm blockchain tx and try collect contract source code. 监听链上活动并收集合约源码☆23Updated last year
- The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)☆43Updated 6 years ago
- ☆98Updated 2 years ago
- This article aims to provide auditors with a baseline checklist for auditing account abstraction wallets implemented based on the EIP4337…☆14Updated last year