romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆113Updated 2 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- Recon tool for URLs discovery☆11Updated last year
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 5 months ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☆38Updated 3 years ago
- ☆22Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- Learning material for completely newcomers in the field of BOFs☆14Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- Resources for Browser Security Research☆40Updated 2 years ago
- OS Command Injection Vulnerability Payload List☆49Updated 4 years ago
- ☆25Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆76Updated 2 months ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆19Updated 10 months ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 11 months ago