The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
-
Updated
Feb 20, 2024 - JavaScript
The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
A Cloudflare worker to generate and inject Content Security Policy nonces in returned HTML pages.
We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen over the years
DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022
Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain
lattice attack.ipynb - One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
Add a description, image, and links to the attacks topic page so that developers can more easily learn about it.
To associate your repository with the attacks topic, visit your repo's landing page and select "manage topics."