romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆59Updated 7 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆32Updated 3 years ago
- Resources for Browser Security Research☆25Updated 2 years ago
- ☆21Updated 7 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆10Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- Talk slides and material☆29Updated 7 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆9Updated 8 years ago
- Automated HTTP Request Repeating With Burp Suite☆34Updated last year
- ☆22Updated last year
- ☆110Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆21Updated 2 months ago
- Materials from different CTFs for later reuse☆22Updated last year
- ☆25Updated 2 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆21Updated 3 years ago
- damn-exploitable-android-app-apk☆32Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- ☆16Updated 3 years ago
- Creates and sends fake meeting invite☆51Updated 3 years ago
- Random Exploits☆50Updated last year
- Review of AWAE.OSWE☆30Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆24Updated 10 months ago
- offensive notes & resources☆40Updated this week
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago