Observations and tips checklist for auditing protocols on multiple chains π§
β711Feb 4, 2026Updated last month
Alternatives and similar repositories for multichain-auditor
Users that are interested in multichain-auditor are comparing it to the libraries listed below
Sorting:
- Bugs in commonly forked DeFi protocolsβ489Oct 3, 2025Updated 5 months ago
- weird erc20 tokensβ1,682Jun 3, 2025Updated 9 months ago
- Awesome list of all things oracle manipulation. Creating to help spread a better understanding of oracles and oracle manipulation.β529Mar 29, 2024Updated last year
- Heuristics for smart contract auditorsβ612Dec 13, 2022Updated 3 years ago
- β1,267Feb 10, 2026Updated 3 weeks ago
- β227Aug 22, 2023Updated 2 years ago
- π Try the Learn EVM Explorer we just launched!!!β1,804Feb 20, 2026Updated 2 weeks ago
- β477Mar 31, 2025Updated 11 months ago
- A list of Blockchain Security audit companies, solo auditors and location of public audits.β789Jan 14, 2025Updated last year
- curation of all(most) immunefi bug bounty writeups I could find(till now)β1,112Jan 21, 2026Updated last month
- A checklist of things to look for when auditing Solidity smart contracts.β791Oct 2, 2023Updated 2 years ago
- Audits and findings by MiloTruckβ178Jul 29, 2025Updated 7 months ago
- Hacks/Vulns/Audits Compilationβ163Sep 5, 2024Updated last year
- Foundry Test Suit to test weird ERC20 behaviorβ235Mar 23, 2023Updated 2 years ago
- Central Repository for the Epoch 0 coursework and quizzes. Contains all the content, cross-referenced and linked.β1,888Sep 21, 2023Updated 2 years ago
- A one-stop shop for blockchain security researchers looking for educational material and alpha to level-up and get an edge on competitionβ¦β402Oct 11, 2023Updated 2 years ago
- β594Apr 25, 2023Updated 2 years ago
- β567Feb 26, 2026Updated last week
- A community-maintained collection of bugs, vulnerabilities, and exploits in apps using ZK crypto.β719Dec 19, 2024Updated last year
- Pre-built security properties for commonly forked DeFi protocolsβ196Nov 7, 2023Updated 2 years ago
- Opinionated security and code quality standard for Solidity smart contracts.β2,165Jul 2, 2023Updated 2 years ago
- public audit & bug reportsβ277Oct 7, 2024Updated last year
- Static smart contract code 4naly3erβ553Aug 14, 2024Updated last year
- A collection of smart contract vulnerabilities along with prevention methodsβ2,433Feb 8, 2026Updated 3 weeks ago
- Smart Contract Security Verification Standardβ514Jan 22, 2025Updated last year
- Demystifying Exploitable Bugs in Smart Contractsβ1,792Jun 19, 2025Updated 8 months ago
- The good, the bad, and the ugly of proxy implementationsβ104Jan 19, 2024Updated 2 years ago
- Pre-built security properties for common Ethereum operationsβ362Feb 23, 2026Updated last week
- A chronological and (hopefully) complete list of reentrancy attacks to date.β1,592Nov 24, 2025Updated 3 months ago
- A collection of Solidity security exercises and puzzles to test your knowledge of Solidity's more esoteric features. Some are easy, and sβ¦β405Nov 11, 2023Updated 2 years ago
- Institutional-grade web3 security.β332Updated this week
- easy POC template generation from the command lineβ325Jan 10, 2024Updated 2 years ago
- To learn common smart contract vulnerabilities using Foundry!β1,907Apr 24, 2025Updated 10 months ago
- This repo contains a comprehensive list of smart contract auditor tools and techniques that can be utilized by both smart contract auditoβ¦β788Aug 5, 2025Updated 7 months ago
- Guidelines and training material to write secure smart contractsβ2,457Jan 26, 2026Updated last month
- This Repository contains list of Common NFT Attack Vectors. If you find any attack vectors missing, you can create a pull request and be β¦β271Dec 4, 2024Updated last year
- These exercises were created for our Advanced Solidity Bootcamp and open sourced. Learn EVM bytecode with the Huff Language.β410Sep 8, 2024Updated last year
- A symbolic testing tool for EVM smart contractsβ971Aug 6, 2025Updated 7 months ago
- This Repository contains list of Common Solidity SmartContract Attack Vectors. If you find any attack vectors missing, you can create a pβ¦β489Jan 28, 2024Updated 2 years ago