nkbai / defcon26Links
my talk on defcon26
☆20Updated 7 years ago
Alternatives and similar repositories for defcon26
Users that are interested in defcon26 are comparing it to the libraries listed below
Sorting:
- Ethereum Smart Contracts Security CheckList From Knownsec 404 Team☆160Updated 6 years ago
- ☆72Updated 7 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Updated 6 years ago
- Vulnerable smart contracts☆70Updated 7 years ago
- The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)☆43Updated 7 years ago
- Ethereum smart contract reverse engineering☆104Updated 7 years ago
- This is Ethereum devp2p protocol dissector plugin for wireshark.☆49Updated 7 years ago
- VeChain core nodes security checklist(唯链核心节点安全执行指南)☆55Updated 4 years ago
- 以太坊单合约交易调试工具☆16Updated 4 years ago
- Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)☆47Updated 4 years ago
- SlowMist Vulnerability Research Advisories☆279Updated 10 months ago
- Blockchain Threat Intelligence Sharing Platform(区块链威胁情报共享平台)☆112Updated 4 years ago
- ☆23Updated 6 years ago
- ☆31Updated 8 months ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- NoneAge Blockchain Security Tutorial☆42Updated 5 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆317Updated last year
- This repo contains a collection of smart contract honeypots.☆293Updated 7 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆90Updated 7 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Updated 6 years ago
- ☆27Updated 7 years ago
- ☆35Updated 7 years ago
- ☆26Updated 8 years ago
- Browser Fuzz Summarize / 浏览器模糊测试综述☆142Updated 5 years ago
- IOT Research Blog 物联网安全技术研究小组☆51Updated 7 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Updated 7 years ago
- BlockChain-Security-List☆105Updated 7 years ago
- 之Crypto☆43Updated 8 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Updated 5 years ago
- ☆15Updated 7 years ago