romanzaikin / From-Zero-to-Hero-in-Blockchain-Security-DefCon30-WorkshopLinks
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a…
☆29Updated 3 years ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Users that are interested in From-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop are comparing it to the libraries listed below
Sorting:
- ☆113Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- ☆25Updated last year
- ☆22Updated 2 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- Slides and other material from various conference presentations.☆45Updated 3 months ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆49Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Recon tool for URLs discovery☆11Updated last year
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 3 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆29Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆39Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago