security-alliance / advisoriesView external linksLinks
☆11Jul 15, 2024Updated last year
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- ☆17Oct 5, 2020Updated 5 years ago
- ☆17Apr 3, 2024Updated last year
- ☆14May 19, 2022Updated 3 years ago
- Simulating a modified Satoshi consensus (penalty system for delayed block submission) by Horizen to enhance protection against 51% attack…☆16May 14, 2020Updated 5 years ago
- https://twitter.com/jtriley_eth/status/1550459124047138819?s=20&t=cTBP-TSnIstNEwwPuRDF5Q☆17Jul 27, 2022Updated 3 years ago
- Rust library to disassemble evm bytecode☆23Jan 11, 2026Updated last month
- Consensus layer peer-to-peer connection setup☆17Jun 18, 2024Updated last year
- spec for API monetisation using blockchain + stablecoins instead of API keys☆34Sep 24, 2025Updated 4 months ago
- A suite of portable, extensible `std` components for the superchain.☆21Jan 20, 2025Updated last year
- Scans the internet for open geth RPC clients☆25Jul 2, 2017Updated 8 years ago
- ☆30Feb 2, 2026Updated last week
- ☆45Feb 4, 2026Updated last week
- A barebones contract to easily mint Soulbound NFTs☆30May 12, 2022Updated 3 years ago
- Suite of tools for Monitoring OP Stack Chains 🔴 Offers real-time detection and Incident response capabilities ✨☆38Jan 15, 2026Updated 3 weeks ago
- Keccak-f[1600] permutation in the EVM☆28Feb 3, 2025Updated last year
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 3 months ago
- ☆29Jul 22, 2022Updated 3 years ago
- A two-day event focused on high-performance, bleeding edge crypto infrastructure. By open source engineers, for open source engineers.☆38Aug 13, 2025Updated 6 months ago
- A mostly mostly reasonable approach to inline Yul styling.☆31Apr 19, 2024Updated last year
- My public exploit collection.☆31Oct 23, 2018Updated 7 years ago
- ☆28Dec 8, 2021Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆12Apr 8, 2025Updated 10 months ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- Aave Seatbelt for governance proposals☆18Updated this week
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆50Mar 6, 2025Updated 11 months ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Celestia derivation pipeline and proof crate built with kona☆15Dec 19, 2025Updated last month
- Ethereum system contract implementations (asm)☆49Oct 27, 2025Updated 3 months ago
- ☆11Dec 19, 2024Updated last year
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- build onchain apps that use zupass proofs at the contract level☆10May 31, 2024Updated last year