tbceth / public-smart-contractsView external linksLinks
☆13Feb 19, 2022Updated 3 years ago
Alternatives and similar repositories for public-smart-contracts
Users that are interested in public-smart-contracts are comparing it to the libraries listed below
Sorting:
- A tool for facilitating livestock contact tracing.☆13Oct 10, 2024Updated last year
- This web3 Airbnb clone was built using React, Solidity, and CometChat SDK. Please leave a star on the project and note that it is hosted …☆11Mar 30, 2023Updated 2 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- ☆10Feb 15, 2023Updated 2 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Jun 13, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Demo Video => https://www.youtube.com/watch?v=fXALOjhUBRk&t=1s☆16Oct 28, 2020Updated 5 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 8 months ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆19Sep 23, 2025Updated 4 months ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- ☆15Oct 25, 2022Updated 3 years ago
- A fast, simple, and powerful open-source utility tool for generating strong, unique, and random passwords. The Password Generator support…☆21Feb 7, 2026Updated last week
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- ☆18Sep 24, 2018Updated 7 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 5 months ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Advanced Hash Password Decryptor.Auto detect hash🔥☆18May 5, 2021Updated 4 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- ☆23Jan 29, 2023Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Pentesting post exploitation tool for slack☆31Nov 15, 2025Updated 2 months ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Simple Windows cleanup utility☆23Oct 30, 2023Updated 2 years ago
- A collection of investigation reports analyzed with MetaSleuth, a crypto fund flow visualization and analysis tool powered by @blocksecte…☆23Jun 14, 2023Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆24Nov 18, 2025Updated 2 months ago