romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- ☆113Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆36Updated this week
- Install and upgrade projectdiscovery tools☆10Updated 3 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 5 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- AI Powered Sensitive Information Detection☆19Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- ☆38Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated 10 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365 and gather emails on Linkedin☆10Updated 3 years ago
- Recon tool for URLs discovery☆11Updated last year
- ☆21Updated 7 years ago
- ☆48Updated 4 years ago
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 11 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 2 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago