pcaversaccio / ecdsa-nonce-reuse-attackLinks
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆105Updated 3 weeks ago
Alternatives and similar repositories for ecdsa-nonce-reuse-attack
Users that are interested in ecdsa-nonce-reuse-attack are comparing it to the libraries listed below
Sorting:
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- A framework for assessing the security of L2s☆49Updated 2 years ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆60Updated this week
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated 2 years ago
- A collection of my security audits☆55Updated 4 months ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆83Updated 2 weeks ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- Collection of PoCs and exploits for DeFi and other Ethereum projects☆82Updated 3 years ago
- ☆87Updated 3 months ago
- A recreation of capturetheether.com using Solidity 0.8.0 and the foundry environment.☆91Updated last year
- Practical fuzzing examples for the mastering fuzzing talk☆108Updated 2 years ago
- ☆50Updated 2 years ago
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆107Updated 2 years ago
- ☆115Updated 3 years ago
- ☆46Updated last year
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆56Updated last year
- ☆21Updated 2 years ago
- ☆34Updated 7 months ago
- Identify flashloan bots in multiple chains☆34Updated 3 years ago
- Collection of past CTFs to play and practice locally.☆52Updated last year
- Tool and testing methodology for subjecting blockchain devnets to simulated network and side channel attacks☆75Updated 5 months ago
- ☆85Updated last year
- DeFi exploits for educational purposes☆60Updated 2 years ago
- ☆47Updated 2 years ago
- Diagrams for Solidity contracts☆47Updated last year
- Public infra related to hosting Paradigm CTF☆115Updated last year
- Writeup for solved challenges in Paradigm CTF 2022☆74Updated 3 years ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆75Updated last year