Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solidity or vyper
☆133Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for LowLevelVulnerabilities
Users that are interested in LowLevelVulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆227Aug 22, 2023Updated 2 years ago
- ☆90Aug 2, 2023Updated 2 years ago
- Bugs in commonly forked DeFi protocols☆489Oct 3, 2025Updated 4 months ago
- Observations and tips checklist for auditing protocols on multiple chains 🧐☆710Feb 4, 2026Updated 3 weeks ago
- CTF challenges made by MiloTruck☆97Jul 3, 2025Updated 7 months ago
- The good, the bad, and the ugly of proxy implementations☆104Jan 19, 2024Updated 2 years ago
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Jul 29, 2023Updated 2 years ago
- Code examples in Yul☆257Aug 27, 2024Updated last year
- All things Uniswap☆185Feb 15, 2024Updated 2 years ago
- ☆77Aug 1, 2025Updated 7 months ago
- Awesome list of all things oracle manipulation. Creating to help spread a better understanding of oracles and oracle manipulation.☆529Mar 29, 2024Updated last year
- curation of all(most) immunefi bug bounty writeups I could find(till now)☆1,113Jan 21, 2026Updated last month
- ☆88Sep 3, 2025Updated 5 months ago
- Adding Defi Vulnerabilities.☆168Nov 17, 2022Updated 3 years ago
- Pre-built security properties for commonly forked DeFi protocols☆196Nov 7, 2023Updated 2 years ago
- A portfolio repository for Egis Security's past audits☆62Nov 7, 2025Updated 3 months ago
- A collection of Solidity security exercises and puzzles to test your knowledge of Solidity's more esoteric features. Some are easy, and s…☆403Nov 11, 2023Updated 2 years ago
- This Repository contains list of Common DeFi threat and Attack Vectors. If you find any attack vectors missing, you can create a pull req…☆230Jan 28, 2024Updated 2 years ago
- Web3.0 Audit Resources and Competition Materials☆19Feb 20, 2026Updated last week
- Audits and findings by MiloTruck☆178Jul 29, 2025Updated 7 months ago
- These exercises were created for our Advanced Solidity Bootcamp and open sourced. Learn EVM bytecode with the Huff Language.☆410Sep 8, 2024Updated last year
- My homework and notes on zkEVM Bootcamp by zkSync and Encode Club☆65Dec 16, 2024Updated last year
- POCs and In-depth explanation of the logic and math behind common elliptic curve cryptography edge cases and attack vectors☆44Jul 16, 2024Updated last year
- A list of public fuzzing campaigns☆129Jan 24, 2026Updated last month
- ☆12Sep 16, 2025Updated 5 months ago
- ☆594Apr 25, 2023Updated 2 years ago
- Common security findings in smart contracts☆126Dec 16, 2022Updated 3 years ago
- Heuristics for smart contract auditors☆611Dec 13, 2022Updated 3 years ago
- ☆476Mar 31, 2025Updated 11 months ago
- Security Reviews and Audit Checklists☆132Jul 22, 2025Updated 7 months ago
- Gaining the most elusive of tips. Add your input and let's collect them all!☆353Mar 6, 2024Updated last year
- Practical fuzzing examples for the mastering fuzzing talk☆109Jun 29, 2023Updated 2 years ago
- ☆568Updated this week
- ☆62Dec 13, 2023Updated 2 years ago
- Example of the whitehack for Curve exploit 30/07/23☆19Aug 3, 2023Updated 2 years ago
- ☆67Jan 26, 2025Updated last year
- A comparison of solidity fuzzing tools Foundry, Echidna & Medusa☆185Feb 1, 2025Updated last year
- ☆70May 14, 2025Updated 9 months ago
- Collection of security reviews of ZK Protocols☆240Dec 1, 2024Updated last year