nkbai / defcon26
my talk on defcon26
☆20Updated 6 years ago
Alternatives and similar repositories for defcon26
Users that are interested in defcon26 are comparing it to the libraries listed below
Sorting:
- ☆70Updated 6 years ago
- Ethereum Smart Contracts Security CheckList From Knownsec 404 Team☆157Updated 5 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Updated 6 years ago
- Vulnerable smart contracts☆69Updated 7 years ago
- This is Ethereum devp2p protocol dissector plugin for wireshark.☆47Updated 6 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 6 years ago
- Ethereum smart contract reverse engineering☆102Updated 6 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)☆44Updated 6 years ago
- ☆26Updated last month
- some smart contract demos for audit lectures.☆7Updated 6 years ago
- Blockchain Challenges Collection(WIP)☆56Updated 2 years ago
- Ethereum based smart contract vulnerability checklist (关于区块链以太坊安全类问题)☆30Updated 5 years ago
- Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)☆46Updated 3 years ago
- 以太坊单合约交易调试工具☆16Updated 3 years ago
- VeChain core nodes security checklist(唯链核心节点安全执行指南)☆54Updated 3 years ago
- NoneAge Blockchain Security Tutorial☆42Updated 5 years ago
- ☆138Updated 3 years ago
- Papers of smart contract security analysis (and tools)☆35Updated 5 years ago
- 自己ctf比赛的writeup☆19Updated 5 years ago
- ☆13Updated 5 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Updated 2 years ago
- Challenges I created for 35c3☆48Updated 6 years ago
- Personal CodeQL queries☆62Updated last week
- ☆16Updated 7 years ago
- Record some Vulnerabilities☆44Updated 2 years ago
- ☆26Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆55Updated 3 years ago
- n0js xss challenges☆27Updated 6 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Updated 5 years ago