pcaversaccio / ecdsa-nonce-reuse-attackLinks
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆102Updated last week
Alternatives and similar repositories for ecdsa-nonce-reuse-attack
Users that are interested in ecdsa-nonce-reuse-attack are comparing it to the libraries listed below
Sorting:
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆59Updated last week
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- ☆34Updated 5 months ago
- ☆87Updated last month
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆106Updated 2 years ago
- ☆49Updated 2 years ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆78Updated last month
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- CTF Writeups☆36Updated last year
- Collection of past CTFs to play and practice locally.☆52Updated last year
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- Damn Vulnerable DeFi v4 Solutions☆48Updated last year
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- ☆46Updated last year
- ☆84Updated last year
- ☆115Updated 3 years ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆75Updated last year
- ☆21Updated 2 years ago
- A collection of my security audits☆55Updated 2 months ago
- Writeup for solved challenges in Paradigm CTF 2022☆76Updated 3 years ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- Practical fuzzing examples for the mastering fuzzing talk☆107Updated 2 years ago
- DeFi exploits for educational purposes☆61Updated 2 years ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆55Updated last year
- ☆87Updated last year
- An EVM Jump-Oriented Programming Puzzle in SECCON CTF 2023 Quals☆28Updated 2 years ago
- SushiSwap RouteProcessor2 exploit repro + supporting data useful for whitehats.☆92Updated 2 years ago
- This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed…☆113Updated this week
- Quill CTF is a game in which you hack Ethereum smart contracts to learn about security. The game is designed to educate players on how t…☆60Updated 2 years ago