5049504F / cryptocurrency-securityLinks
Document created to serve as a first step to learn about blockchain and smart contract security.
☆19Updated 3 years ago
Alternatives and similar repositories for cryptocurrency-security
Users that are interested in cryptocurrency-security are comparing it to the libraries listed below
Sorting:
- My Blockchain auditing service☆22Updated last month
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 3 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆141Updated 3 months ago
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆10Updated 2 weeks ago
- Security Audit reports by Decurity☆43Updated 3 weeks ago
- Practical fuzzing examples for the mastering fuzzing talk☆109Updated last year
- Scripts used in Blockchain Exploitation Blog☆41Updated last year
- ☆42Updated 2 years ago
- Learn smart contract security by hacking popular smart contract systems.☆100Updated 6 years ago
- ☆22Updated 2 years ago
- A framework for assessing the security of L2s☆47Updated last year
- ☆110Updated last year
- ☆25Updated last year
- Smart Contract Security Testing Guide (SCSTG)☆17Updated last year
- A collection of my security audits☆53Updated 3 months ago
- a multithreaded fast tool to preform active subdomain enumeration☆34Updated 2 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- ☆111Updated 2 years ago
- My key take-aways from reviewing vulnerable Solidity smart contracts☆9Updated 2 years ago
- ☆47Updated last week
- File system enumerator and monitor for Android and Ubuntu.☆17Updated 3 years ago
- ☆22Updated 3 years ago
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆138Updated this week
- ☆52Updated last year
- ☆31Updated 3 years ago
- Install and upgrade projectdiscovery tools☆10Updated 3 years ago
- Scrappy assistant that automates web3 bug hunting workflows. Tracks ongoing bug bounties and launches autonomous agents that can perform …☆111Updated 2 months ago
- A comprehensive list of security practices for DeFi protocols.☆87Updated 7 months ago
- ☆19Updated 4 years ago
- Every time a Bug Bounty Program in Immunefi modifies its policy, assets-in-scope, or bounties-table, a bot will commit those changes to t…☆51Updated this week