romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 3 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- ☆112Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 5 years ago
- ☆25Updated last year
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- OS Command Injection Vulnerability Payload List☆51Updated 4 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆52Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Updated 5 years ago
- Slides and other material from various conference presentations.☆46Updated 3 months ago
- Recon tool for URLs discovery☆11Updated last year
- ☆11Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- ☆17Updated 4 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Updated 4 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- BlockChain-Security-List☆105Updated 7 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- Resources for Browser Security Research☆49Updated 3 years ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last year