Vulnerable smart contracts
☆70Apr 17, 2018Updated 7 years ago
Alternatives and similar repositories for Solidlity-Vulnerable
Users that are interested in Solidlity-Vulnerable are comparing it to the libraries listed below
Sorting:
- This repo contains a collection of smart contract honeypots.☆293Apr 1, 2018Updated 7 years ago
- This repo collects almost all the smart contract honeypots that you could find in the first three pages of Google search.☆99Apr 20, 2019Updated 6 years ago
- my talk on defcon26☆20Sep 29, 2018Updated 7 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Ghidra's Sleigh syntax highligther☆12Oct 18, 2019Updated 6 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- A Proof Of Stake blockchain example☆12Aug 22, 2022Updated 3 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Open Redirect Vulnerability scanner (Pwn0sec-Project)☆20Sep 19, 2020Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Solstice is a security analysis framework for investigative smart contract examination. The first prototype of Solstice, code named W18 (…☆20Jan 13, 2019Updated 7 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- 🔥 Understanding Gas on Ethereum - How it works!☆18Feb 16, 2018Updated 8 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- ☆20Jan 31, 2020Updated 6 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated 2 years ago
- PHPSCAN: Security analysis tool for PHP☆64Jun 3, 2025Updated 9 months ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- Discord-Social-Security-bot☆24Apr 15, 2022Updated 3 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago