pcaversaccio / ecdsa-nonce-reuse-attack
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆87Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for ecdsa-nonce-reuse-attack
- Practical fuzzing examples for the mastering fuzzing talk☆107Updated last year
- ☆66Updated 10 months ago
- Damn Vulnerable DeFi v4 Solutions☆35Updated 2 months ago
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆30Updated last week
- ☆22Updated last year
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated 7 months ago
- A comparison of solidity fuzzing tools Foundry, Echidna & Medusa☆115Updated this week
- A Solidity code search tool with built-in static analysis detection☆73Updated 4 months ago
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆93Updated last year
- A framework for assessing the security of L2s☆45Updated last year
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆28Updated 6 months ago
- ☆83Updated 4 months ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆50Updated 7 months ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆48Updated 2 weeks ago
- A collection of my security audits☆54Updated last month
- This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed…☆110Updated 2 weeks ago
- CTF challenges made by MiloTruck☆65Updated 2 months ago
- CTF Writeups☆36Updated 11 months ago
- Security Reviews and Audit Checklists☆94Updated 6 months ago
- ☆114Updated 2 years ago
- Collection of past CTFs to play and practice locally.☆49Updated 3 months ago
- ☆49Updated 11 months ago
- ☆50Updated 3 weeks ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆49Updated 9 months ago
- Here we decide who is the best☆21Updated last year
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆26Updated 4 months ago
- ☆46Updated 8 months ago
- ☆85Updated 10 months ago
- ☆45Updated 10 months ago
- List of Halmos resources.☆48Updated last month