pcaversaccio / ecdsa-nonce-reuse-attackLinks
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆92Updated last month
Alternatives and similar repositories for ecdsa-nonce-reuse-attack
Users that are interested in ecdsa-nonce-reuse-attack are comparing it to the libraries listed below
Sorting:
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆57Updated last month
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- ☆33Updated 2 months ago
- A Solidity code search tool with built-in static analysis detection☆75Updated 11 months ago
- ☆78Updated last year
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆105Updated 2 years ago
- Damn Vulnerable DeFi v4 Solutions☆44Updated 9 months ago
- Practical fuzzing examples for the mastering fuzzing talk☆109Updated 2 years ago
- ☆88Updated 4 months ago
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆46Updated 8 months ago
- A collection of my security audits☆54Updated 3 weeks ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆68Updated this week
- Writeup for solved challenges in Paradigm CTF 2022☆76Updated 2 years ago
- Collection of past CTFs to play and practice locally.☆53Updated 10 months ago
- Tool and testing methodology for subjecting blockchain devnets to simulated network and side channel attacks☆76Updated this week
- ☆21Updated last year
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆72Updated last year
- ☆46Updated last year
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- Here we decide who is the best☆21Updated last year
- Public infra related to hosting Paradigm CTF☆112Updated last year
- DeFi Security Breaches: Comprehensive Root Cause Analysis☆63Updated 3 weeks ago
- ☆115Updated 3 years ago
- Index of Rareskill Blog posts using playwright☆21Updated last year
- ☆50Updated 2 years ago
- Checklist for security audit of tron projects by @positivesecurity☆23Updated 10 months ago