Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solidity or vyper
☆134Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for LowLevelVulnerabilities
Users that are interested in LowLevelVulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆224Aug 22, 2023Updated 2 years ago
- Bugs in commonly forked DeFi protocols☆489Oct 3, 2025Updated 7 months ago
- ☆90Aug 2, 2023Updated 2 years ago
- Observations and tips checklist for auditing protocols on multiple chains 🧐☆712Feb 4, 2026Updated 3 months ago
- Awesome list of all things oracle manipulation. Creating to help spread a better understanding of oracles and oracle manipulation.☆528Mar 29, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code examples in Yul☆257Aug 27, 2024Updated last year
- curation of all(most) immunefi bug bounty writeups I could find(till now)