romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 3 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- ☆112Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Resources for Browser Security Research☆44Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Updated 5 years ago
- Slides and other material from various conference presentations.☆46Updated last week
- 2022 CTF public release☆23Updated 3 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Updated 3 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆50Updated 2 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆65Updated 4 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- OS Command Injection Vulnerability Payload List☆49Updated 4 years ago
- ☆17Updated 4 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 6 years ago
- ☆25Updated last year
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- ☆22Updated 2 years ago
- BlockChain-Security-List☆102Updated 7 years ago
- Recon tool for URLs discovery☆11Updated last year
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Updated 4 years ago