A curated list of smart contract attack vectors
-
Updated
Aug 23, 2024
A curated list of smart contract attack vectors
Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickle module is used for deserialization of serialized data. I will update it with more attack vectors to targets other modules.
DOM Clobbering Wiki, Browser Testing, and Payload Generation
A collection of cybersecurity attack vectors
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
CloudIDEaaS WAF is a Web Application Firewall product that supports the industry standard OWASP ruleset. It is A.I. and configuration-driven, cloud native, and extensible. It is community open-sourced, supports IP and GEO fencing, and can support reverse proxy cloud, on-premise, in process, or appliance.
My personal research on different attack vectors, including DDoS attack types, payloads and a honeypot sensor to detect malicious actors.
Green team
Add a description, image, and links to the attack-vectors topic page so that developers can more easily learn about it.
To associate your repository with the attack-vectors topic, visit your repo's landing page and select "manage topics."