nkbai / defcon26Links
my talk on defcon26
☆20Updated 6 years ago
Alternatives and similar repositories for defcon26
Users that are interested in defcon26 are comparing it to the libraries listed below
Sorting:
- Ethereum Smart Contracts Security CheckList From Knownsec 404 Team☆157Updated 5 years ago
- ☆70Updated 7 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Updated 6 years ago
- Vulnerable smart contracts☆69Updated 7 years ago
- The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)☆44Updated 6 years ago
- Ethereum smart contract reverse engineering☆102Updated 6 years ago
- SlowMist Vulnerability Research Advisories☆279Updated 4 months ago
- ☆27Updated 7 years ago
- This is Ethereum devp2p protocol dissector plugin for wireshark.☆48Updated 7 years ago
- VeChain core nodes security checklist(唯链核心节点安全执行指南)☆54Updated 3 years ago
- 以太坊单合约交易调试工具☆16Updated 3 years ago
- This repo contains a collection of smart contract honeypots.☆289Updated 7 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)☆46Updated 3 years ago
- 之Crypto☆43Updated 8 years ago
- NoneAge Blockchain Security Tutorial☆42Updated 5 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Updated 7 years ago
- Challenges I created for 35c3☆48Updated 6 years ago
- Blockchain Threat Intelligence Sharing Platform(区块链威胁情报共享平台)☆110Updated 3 years ago
- ☆23Updated 6 years ago
- CTF writeup for learning☆22Updated 4 years ago
- ☆28Updated 3 months ago
- Exploiting Python PIL Module Command Execution Vulnerability☆55Updated 3 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Updated 5 years ago
- ☆26Updated 8 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 7 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- The Etherum RPC Steal Toolset and honeypot .以太坊"偷渡"漏洞利用和蜜罐工具集.☆39Updated 6 years ago
- ☆35Updated 6 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆314Updated last year