Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solidity or vyper
☆133Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for LowLevelVulnerabilities
Users that are interested in LowLevelVulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆227Aug 22, 2023Updated 2 years ago
- Bugs in commonly forked DeFi protocols☆489Oct 3, 2025Updated 5 months ago
- ☆90Aug 2, 2023Updated 2 years ago
- Observations and tips checklist for auditing protocols on multiple chains 🧐☆712Feb 4, 2026Updated last month
- Awesome list of all things oracle manipulation. Creating to help spread a better understanding of oracles and oracle manipulation.☆529Mar 29, 2024Updated last year
- Code examples in Yul☆256Aug 27, 2024Updated last year
- curation of all(most) immunefi bug bounty writeups I could find(till now)☆1,116Jan 21, 2026Updated 2 months ago
- The good, the bad, and the ugly of proxy implementations☆104Jan 19, 2024Updated 2 years ago
- A portfolio repository for Egis Security's past audits☆63Nov 7, 2025Updated 4 months ago
- Pre-built security properties for commonly forked DeFi protocols☆196Nov 7, 2023Updated 2 years ago
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Jul 29, 2023Updated 2 years ago
- Adding Defi Vulnerabilities.☆168Nov 17, 2022Updated 3 years ago
- All things Uniswap☆185Feb 15, 2024Updated 2 years ago
- This Repository contains list of Common DeFi threat and Attack Vectors. If you find any attack vectors missing, you can create a pull req…☆231Jan 28, 2024Updated 2 years ago
- ☆77Aug 1, 2025Updated 7 months ago
- CTF challenges made by MiloTruck☆98Jul 3, 2025Updated 8 months ago
- A collection of Solidity security exercises and puzzles to test your knowledge of Solidity's more esoteric features. Some are easy, and s…☆408Nov 11, 2023Updated 2 years ago
- A list of public fuzzing campaigns☆129Jan 24, 2026Updated last month
- Practical fuzzing examples for the mastering fuzzing talk☆109Jun 29, 2023Updated 2 years ago
- Common security findings in smart contracts☆126Dec 16, 2022Updated 3 years ago
- Web3.0 Audit Resources and Competition Materials☆19Mar 6, 2026Updated 2 weeks ago
- Audits and findings by MiloTruck☆178Jul 29, 2025Updated 7 months ago
- ☆477Mar 31, 2025Updated 11 months ago
- Heuristics for smart contract auditors☆612Dec 13, 2022Updated 3 years ago
- These exercises were created for our Advanced Solidity Bootcamp and open sourced. Learn EVM bytecode with the Huff Language.☆411Sep 8, 2024Updated last year
- Gaining the most elusive of tips. Add your input and let's collect them all!☆353Mar 6, 2024Updated 2 years ago
- ☆88Sep 3, 2025Updated 6 months ago
- Novel reentrancy attack on Ethereum Smart Contracts using Transient Storage and little gas☆15Nov 10, 2023Updated 2 years ago
- ☆12Sep 16, 2025Updated 6 months ago
- POCs and In-depth explanation of the logic and math behind common elliptic curve cryptography edge cases and attack vectors☆44Jul 16, 2024Updated last year
- Security Reviews and Audit Checklists☆131Jul 22, 2025Updated 8 months ago
- ☆593Apr 25, 2023Updated 2 years ago
- ☆569Updated this week
- ☆67Jan 26, 2025Updated last year
- ☆286Jan 19, 2026Updated 2 months ago
- Foundry Test Suit to test weird ERC20 behavior☆234Mar 23, 2023Updated 2 years ago
- ☆62Dec 13, 2023Updated 2 years ago
- Smart Contract Vulnerabilities (SCV) List☆509Aug 22, 2023Updated 2 years ago
- My homework and notes on zkEVM Bootcamp by zkSync and Encode Club☆66Dec 16, 2024Updated last year