romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop:
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 7 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Tools and scripts written for personal use☆13Updated 4 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- ☆22Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆27Updated 5 months ago
- Collection of wordlists containing dangerous function calls in many languages☆25Updated 3 weeks ago
- gSAST - Grep Static Analysis Security Tool☆11Updated 11 months ago
- ☆28Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- damn-exploitable-android-app-apk☆38Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 4 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- You don't need wires to be connected☆40Updated 4 years ago
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Updated last month
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated last month
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Slides and other material from various conference presentations.☆40Updated last week
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago