romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 2 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 10 months ago
- Ansible build for Afl++ Frida-Mode☆23Updated 11 months ago
- 2022 CTF public release☆23Updated 2 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 2 years ago
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆29Updated 2 years ago
- Random Exploits☆50Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Updated 2 years ago
- Recon tool for URLs discovery☆11Updated 11 months ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Get GTFOBins info about a given exploit from the command line☆40Updated 10 months ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Updated 3 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago