damianrusinek's Stars
rolod0x/rolod0x
Your free private onchain address book
securing/SCSVS
Smart Contract Security Verification Standard
tintinweb/smart-contract-sanctuary
🐦🌴🌴🌴🦕 A home for ethereum smart contracts. 🏠
Decurity/semgrep-smart-contracts
Semgrep rules for smart contracts based on DeFi exploits
0xisk/awesome-solidity-gas-optimization
Best resources for Solidity gas optimizations ⛽
gweicz/defi-toolkit
[DEPRECATED] Curated list of best tools for user of Ethereum (DeFi) ecosystem
tintinweb/smart-contract-inspector
the magic X-ray machine for solidity smart contracts
bl4de/dictionaries
Misc dictionaries for directory/file enumeration, username enumeration, password dictionary/bruteforce attacks
sting8k/BurpSuite_403Bypasser
Burpsuite Extension to bypass 403 restricted directory
PaulRBerg/hardhat-template
Hardhat-based template for developing Solidity smart contracts
sivachokkapu/revive-cc
Static analysis tool for Hyperledger Frabric smart contracts written in Go.
wearetheledger/awesome-hyperledger-fabric
A curated list of resources for creating applications with hyperledger fabric
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
Kevin-Robertson/Inveigh
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
breenmachine/RottenPotatoNG
New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.
rsmudge/Layer2-Pivoting-Client
A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.
3gstudent/Winpcap_Install
Auto install WinPcap on Windows(command line)
gregnietsky/simpletun
Example program for tap driver VPN
web3examples/ethereum
Examples related to ethereum
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
naivenom/hash-collision-attack
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same hash output, it is called a collision. This collision can then be exploited by any application that compares two hashes together – such as password hashes, file integrity checks, etc.
BitTheByte/Awesome-collisions
Collection of vulnerable functions
purpleteam/snarf
Snarf man-in-the-middle / relay suite
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
ShawnDEvans/smbmap
SMBMap is a handy SMB enumeration tool
PyroTek3/PowerShell-AD-Recon
PowerShell Scripts I find useful
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
PowerShellEmpire/PowerTools
PowerTools is a collection of PowerShell projects with a focus on offensive operations.
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.