tayvano / lazarus-bluenoroff-researchLinks
a collection of north korean apt articles, analysis and heists attributed to lazarus / bluenoroff / apt38.
☆208Updated this week
Alternatives and similar repositories for lazarus-bluenoroff-research
Users that are interested in lazarus-bluenoroff-research are comparing it to the libraries listed below
Sorting:
- Collection of public security reviews☆216Updated 2 weeks ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆56Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆105Updated 3 weeks ago
- SEAL 911 is a project designed to give users, developers, and security researchers an accessible way to connect with a small group of hig…☆280Updated last week
- A curated list of blockchain security Capture the Flag (CTF) competitions☆91Updated 2 years ago
- ☆54Updated 2 years ago
- 👾 my notes on decentralized protocols (e.g., oracles, bridges, honeypots, cryptography, decompilers, static analysis, bounties)☆270Updated 2 weeks ago
- Implementation of the Ethereum Virtual Machine in Rust.☆58Updated last year
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- White hat frontrunning script to outpace hackers and secure funds from compromised wallets.☆178Updated 3 weeks ago
- A recreation of capturetheether.com using Solidity 0.8.0 and the foundry environment.☆91Updated last year
- Collection of CTFs for Fun and Interviewing Applicants☆151Updated 10 months ago
- ☆160Updated last week
- Tornado Cash as a foundry project, using latest versions of tools such as Circom, snarkJS, etc.☆244Updated last year
- A checklist detailing DevSecOps practices for EVM-based projects.☆149Updated 3 years ago
- A comprehensive list of security practices for DeFi protocols.☆86Updated last year
- ☆32Updated 3 years ago
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆107Updated 2 years ago
- Tool to hack a vanity address generated with Profanity☆141Updated last year
- All your EVM tools in one place!☆216Updated 3 weeks ago
- ☆67Updated last year
- This repository contains Zk learning resources☆159Updated last year
- Vacant Positions at Sigma Prime☆57Updated last month
- The best smart contracts in one place.☆494Updated this week
- Practical fuzzing examples for the mastering fuzzing talk☆108Updated 2 years ago
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆131Updated last year
- My Works & Articles List☆15Updated 2 years ago
- Cryptography notes☆57Updated last year
- Most simple design of a stablecoin.☆76Updated last year