pcaversaccio / ecdsa-nonce-reuse-attack
This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce during signature generation.
☆90Updated this week
Alternatives and similar repositories for ecdsa-nonce-reuse-attack:
Users that are interested in ecdsa-nonce-reuse-attack are comparing it to the libraries listed below
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- Practical fuzzing examples for the mastering fuzzing talk☆110Updated last year
- A collection of my security audits☆53Updated 2 months ago
- ☆76Updated last year
- A Solidity code search tool with built-in static analysis detection☆74Updated 9 months ago
- Damn Vulnerable DeFi v4 Solutions☆42Updated 7 months ago
- Collection of past CTFs to play and practice locally.☆52Updated 8 months ago
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated 9 months ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆51Updated last week
- A framework for assessing the security of L2s☆46Updated last year
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆103Updated last year
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆45Updated 6 months ago
- Certora's Formal Verification and Audit Portfolio – a comprehensive collection of smart contract security verification reports and audits…☆18Updated 2 weeks ago
- ☆46Updated last year
- ☆86Updated last year
- Public profile of my adventure as a blockchain and smart contract security auditor.☆70Updated last month
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆52Updated last year
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆71Updated last year
- ☆87Updated last month
- ☆52Updated last year
- Web3 Security Toolbox☆73Updated last year
- Checklist for security audit of tron projects by @positivesecurity☆23Updated 7 months ago
- Diagrams for Solidity contracts☆47Updated last year
- ☆115Updated 3 years ago
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆29Updated 3 months ago
- List of the public smart contract audit reports and security reviews performed by Hexens.☆39Updated last week
- Girl Friend <- Generate Foundry Fork Test from Attack Transaction☆120Updated 8 months ago
- CTF challenges made by MiloTruck☆68Updated 8 months ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year