romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 9 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆33Updated last month
- Slides and other material from various conference presentations.☆44Updated last month
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 3 months ago
- gSAST - Grep Static Analysis Security Tool☆12Updated last year
- ☆22Updated 2 years ago
- Just another vulnerable web application.☆36Updated 9 months ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- ☆37Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- damn-exploitable-android-app-apk☆38Updated last year
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆48Updated 4 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- 2022 CTF public release☆23Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- ☆42Updated last month
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 6 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago