{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Toncoin-Smart-Contract-Security-Best-Practices","owner":"slowmist","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":17,"forksCount":2,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,9,4],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-12T08:23:25.772Z"}},{"type":"Public","name":"Knowledge-Base","owner":"slowmist","isFork":false,"description":"Knowledge Base 慢雾安全团队知识库","allTopics":["security","blockchain","hacking","knowledge-base"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":2,"starsCount":3643,"forksCount":525,"license":null,"participation":[1,0,2,0,2,0,1,0,0,1,1,2,0,0,1,1,3,0,0,1,0,0,0,0,4,2,4,1,0,1,0,7,0,3,0,1,0,12,1,2,4,3,0,2,2,0,0,4,1,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-08T03:16:24.322Z"}},{"type":"Public","name":"Cairo0-Security-Audit-Practice-Guide","owner":"slowmist","isFork":false,"description":"This article aims to provide developers with a comprehensive guide on how to conduct effective security audits of smart contracts written in Cairo.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-06T10:30:08.079Z"}},{"type":"Public","name":"zkSnark-Groth16-Getting-Started","owner":"slowmist","isFork":false,"description":"This is a quick introduction to getting started with the zkSnark Groth16 algorithm.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-06T10:25:28.858Z"}},{"type":"Public","name":"APTOS-MOVE-Smart-Contract-Auditing-Primer","owner":"slowmist","isFork":false,"description":"This article aims to provide a simple introductory guide to APTOS smart contract auditing for auditors who already have a foundation in auditing smart contracts in other languages.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-06T08:32:49.546Z"}},{"type":"Public","name":"Blockchain-dark-forest-selfguard-handbook","owner":"slowmist","isFork":false,"description":"Blockchain dark forest selfguard handbook. Master these, master the security of your cryptocurrency.","allTopics":[],"primaryLanguage":null,"pullRequestCount":2,"issueCount":15,"starsCount":5362,"forksCount":644,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,6,0,0,0,0,0,0,0,0,0,0,4,0,0,0,0,0,6,2,0,3,9,0,0,0,2,0,7,1,0,0,0,4,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-05T06:16:33.790Z"}},{"type":"Public","name":"Web3-Project-Security-Practice-Requirements","owner":"slowmist","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":278,"forksCount":37,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-19T08:21:49.277Z"}},{"type":"Public","name":"cryptocurrency-security","owner":"slowmist","isFork":false,"description":"加密资产安全解决方案 Cryptocurrency Security Solution","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":192,"forksCount":41,"license":null,"participation":[0,0,0,0,0,0,0,0,6,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-18T07:09:52.038Z"}},{"type":"Public","name":"Cryptocurrency-Security-Audit-Guide","owner":"slowmist","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":186,"forksCount":45,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,10,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-15T06:41:27.520Z"}},{"type":"Public","name":"SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor","owner":"slowmist","isFork":false,"description":"Smart contract audit skills roadmap for beginners, auditors, engineers, etc.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":581,"forksCount":71,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-12T10:10:25.868Z"}},{"type":"Public","name":"Account-Abstraction-Security-Audit-Checklist","owner":"slowmist","isFork":false,"description":"This article aims to provide auditors with a baseline checklist for auditing account abstraction wallets implemented based on the EIP4337 standard, along with some targeted auditing guidelines.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-11T08:45:46.945Z"}},{"type":"Public","name":"solana-smart-contract-security-best-practices","owner":"slowmist","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":135,"forksCount":26,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-03T03:53:26.849Z"}},{"type":"Public","name":"automatic-tron-address-clustering","owner":"slowmist","isFork":false,"description":"We use machine learning and graph algorithms to analyze the attributes of TRON addresses with the goal of assisting in the tracking of illicit funds.","allTopics":["machine-learning","graph-algorithms","aml","tron-protocol"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":9,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-11T07:23:21.116Z"}},{"type":"Public archive","name":"blockchain-threat-intelligence","owner":"slowmist","isFork":false,"description":"Blockchain Threat Intelligence Sharing Platform(区块链威胁情报共享平台)","allTopics":["security","honeypot","blockchain","hacking","threat-intelligence"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":1,"starsCount":103,"forksCount":31,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:55:40.899Z"}},{"type":"Public","name":"Ontology-Triones-Service-Node-security-checklist","owner":"slowmist","isFork":false,"description":"Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)","allTopics":["checklist","security","blockchain","hacking","ontology"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":45,"forksCount":10,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:55:07.844Z"}},{"type":"Public","name":"blockchainSecurityDB","owner":"slowmist","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":36,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:54:30.145Z"}},{"type":"Public","name":"HackingTime_Public","owner":"slowmist","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":23,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:53:58.054Z"}},{"type":"Public","name":"vechain-core-nodes-security-checklist","owner":"slowmist","isFork":false,"description":"VeChain core nodes security checklist(唯链核心节点安全执行指南)","allTopics":["checklist","security","blockchain","hacking","vechain","vechain-thor"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":53,"forksCount":24,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:52:11.397Z"}},{"type":"Public","name":"eos-bp-nodes-security-checklist","owner":"slowmist","isFork":false,"description":"EOS bp nodes security checklist(EOS超级节点安全执行指南)","allTopics":["checklist","security","blockchain","hacking","eosio"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":361,"forksCount":75,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:51:43.821Z"}},{"type":"Public","name":"eos-smart-contract-security-best-practices","owner":"slowmist","isFork":false,"description":"A guide to EOS smart contract security best practices","allTopics":["security","smart-contracts","blockchain","eosio"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":395,"forksCount":73,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:51:05.826Z"}},{"type":"Public","name":"papers","owner":"slowmist","isFork":false,"description":"SlowMist Vulnerability Research Advisories","allTopics":["security","blockchain","vulnerability","advisories"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":267,"forksCount":32,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-12T09:50:38.550Z"}},{"type":"Public","name":"awesome-blockchain-bug-bounty","owner":"slowmist","isFork":false,"description":"A comprehensive curated list of available Blockchain Bug Bounty Programs.","allTopics":["lists","security","awesome","blockchain","resources","bug-bounty","awesome-list"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":72,"forksCount":14,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-22T08:53:44.468Z"}},{"type":"Public","name":"token-profile","owner":"slowmist","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":3520,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-06-08T12:20:23.967Z"}},{"type":"Public","name":"mwadb-go","owner":"slowmist","isFork":false,"description":"Go SDK of Malicious Wallet Address Database","allTopics":["golang"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-09T03:10:50.682Z"}}],"repositoryCount":24,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"slowmist repositories"}