pcaversaccio / ecdsa-nonce-reuse-attackLinks
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆104Updated last week
Alternatives and similar repositories for ecdsa-nonce-reuse-attack
Users that are interested in ecdsa-nonce-reuse-attack are comparing it to the libraries listed below
Sorting:
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- A collection of my security audits☆55Updated 3 months ago
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆78Updated last month
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆107Updated 2 years ago
- Practical fuzzing examples for the mastering fuzzing talk☆107Updated 2 years ago
- ☆84Updated last year
- A framework for assessing the security of L2s☆48Updated 2 years ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- ☆87Updated 2 months ago
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- Collection of past CTFs to play and practice locally.☆52Updated last year
- Tool and testing methodology for subjecting blockchain devnets to simulated network and side channel attacks☆75Updated 4 months ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆60Updated last week
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- ☆34Updated 6 months ago
- Damn Vulnerable DeFi v4 Solutions☆47Updated last year
- ☆49Updated 2 years ago
- ☆21Updated 2 years ago
- ☆115Updated 3 years ago
- CTF Writeups☆36Updated last year
- ☆46Updated last year
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆75Updated last year
- This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed…☆113Updated last week
- Identify flashloan bots in multiple chains☆34Updated 3 years ago
- Diagrams for Solidity contracts☆47Updated last year
- ☆87Updated last year
- A recreation of capturetheether.com using Solidity 0.8.0 and the foundry environment.☆88Updated last year
- Public infra related to hosting Paradigm CTF☆115Updated last year
- Security Reviews and Audit Checklists☆122Updated 3 months ago