romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
- Resources for Browser Security Research☆25Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Random Exploits☆50Updated last year
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆20Updated last month
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- ☆20Updated 2 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆21Updated 3 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆32Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆14Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 3 years ago
- A python approach to interacting with web shells.☆29Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 3 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Creates and sends fake meeting invite☆51Updated 3 years ago
- ☆13Updated 3 years ago
- gSAST - Grep Static Analysis Security Tool☆10Updated 7 months ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆22Updated 5 months ago
- ☆24Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆87Updated last year
- Collection of wordlists containing dangerous function calls in many languages☆22Updated 2 weeks ago
- OSCP guide and Red Team assessment Guide☆33Updated 4 years ago