☆11Jul 15, 2024Updated last year
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- ☆16Feb 9, 2026Updated 3 weeks ago
- ☆17Apr 3, 2024Updated last year
- ☆17Oct 5, 2020Updated 5 years ago
- https://twitter.com/jtriley_eth/status/1550459124047138819?s=20&t=cTBP-TSnIstNEwwPuRDF5Q☆17Jul 27, 2022Updated 3 years ago
- ☆14May 19, 2022Updated 3 years ago
- Simulating a modified Satoshi consensus (penalty system for delayed block submission) by Horizen to enhance protection against 51% attack…☆16May 14, 2020Updated 5 years ago
- Consensus layer peer-to-peer connection setup☆17Jun 18, 2024Updated last year
- Rust library to disassemble evm bytecode☆24Jan 11, 2026Updated last month
- spec for API monetisation using blockchain + stablecoins instead of API keys☆34Sep 24, 2025Updated 5 months ago
- A suite of portable, extensible `std` components for the superchain.☆21Jan 20, 2025Updated last year
- Scans the internet for open geth RPC clients☆25Jul 2, 2017Updated 8 years ago
- ☆31Feb 27, 2026Updated last week
- Keccak-f[1600] permutation in the EVM☆28Feb 3, 2025Updated last year
- ☆48Updated this week
- A barebones contract to easily mint Soulbound NFTs☆30May 12, 2022Updated 3 years ago
- Suite of tools for Monitoring OP Stack Chains 🔴 Offers real-time detection and Incident response capabilities ✨☆38Updated this week
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- ☆29Jul 22, 2022Updated 3 years ago
- A mostly mostly reasonable approach to inline Yul styling.☆31Apr 19, 2024Updated last year
- A two-day event focused on high-performance, bleeding edge crypto infrastructure. By open source engineers, for open source engineers.☆38Aug 13, 2025Updated 6 months ago
- ☆28Dec 8, 2021Updated 4 years ago
- My public exploit collection.☆31Oct 23, 2018Updated 7 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- ☆12Apr 8, 2025Updated 10 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆52Mar 6, 2025Updated last year
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- Aave Seatbelt for governance proposals☆19Updated this week
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Cloudflare DNS Updater Shell Script☆10Jan 12, 2017Updated 9 years ago
- Transaction fuzzer on steroids for the Ethereum Protocol☆14May 9, 2025Updated 9 months ago
- One of the fastest embeddable key-value ACID database without WAL. libmdbx surpasses the legendary LMDB in terms of reliability, features…☆12Feb 24, 2023Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year