nccgroup / web3-decoder
☆111Updated 2 years ago
Alternatives and similar repositories for web3-decoder:
Users that are interested in web3-decoder are comparing it to the libraries listed below
- ☆110Updated last year
- Collection of CTFs for Fun and Interviewing Applicants☆139Updated 2 months ago
- Rapid Smart Contract Crawler☆199Updated 10 months ago
- Smart Contract Security Testing Guide (SCSTG)☆17Updated last year
- Scrappy assistant that automates web3 bug hunting workflows. Tracks ongoing bug bounties and launches autonomous agents that can perform …☆105Updated 3 weeks ago
- ☆38Updated 3 years ago
- Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.☆91Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated 2 years ago
- My Blockchain auditing service☆22Updated 2 months ago
- Kubernetes pentesting, hardening and hunting tools.☆63Updated 2 years ago
- ☆25Updated last year
- Security Advisories☆32Updated 2 weeks ago
- A framework for assessing the security of L2s☆46Updated last year
- ☆42Updated 2 years ago
- Security Audit reports by Decurity☆40Updated last month
- Learn smart contract security by hacking popular smart contract systems.☆99Updated 6 years ago
- Top disclosed reports from HackerOne☆12Updated last week
- Public audits☆51Updated last year
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- Cairo/Starknet smart contract fuzzer☆122Updated this week
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 2 years ago
- ☆38Updated 2 years ago
- ☆52Updated last year
- ☆22Updated 3 years ago
- Practical fuzzing examples for the mastering fuzzing talk☆110Updated last year
- ☆47Updated last month
- a multithreaded fast tool to preform active subdomain enumeration☆34Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆56Updated 11 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year