romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- ☆113Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☆13Updated 4 years ago
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last year
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆49Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Random Exploits☆50Updated last year
- Recon tool for URLs discovery☆11Updated last year
- A list of awesome penetration testing tools and resources.☆80Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆86Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- ☆22Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- Slides and other material from various conference presentations.☆45Updated 2 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- File system enumerator and monitor for Android and Ubuntu.☆17Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- ☆24Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- ☆25Updated last year
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- ☆48Updated 4 years ago