☆104Nov 6, 2024Updated last year
Alternatives and similar repositories for Bounties-Exploit-Bugs
Users that are interested in Bounties-Exploit-Bugs are comparing it to the libraries listed below
Sorting:
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆74Dec 11, 2025Updated 2 months ago
- ☆77May 12, 2025Updated 9 months ago
- Resources to stay up to date with Move language security.☆65Jan 8, 2026Updated last month
- A collection of resources to help you build better and more secure Solana programs. Kept up to date.☆571Dec 6, 2025Updated 3 months ago
- ☆45Oct 16, 2024Updated last year
- Succinctly prove the fundamental equation of DAI fails to hold using the Certora prover.☆15Jun 4, 2024Updated last year
- Public resources on fuzzing services, methodologies, and benefits for protocol security.☆26Feb 27, 2026Updated last week
- ☆139Oct 31, 2025Updated 4 months ago
- This repository contains a curated collection of resources focused on auditing Move smart contracts. It includes tools, best practices, c…☆152May 14, 2025Updated 9 months ago
- A smart contract security search utility☆76Dec 26, 2024Updated last year
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆32Jan 18, 2025Updated last year
- ☆57Dec 14, 2025Updated 2 months ago
- Security Reviews and Audit Checklists☆131Jul 22, 2025Updated 7 months ago
- curation of all(most) immunefi bug bounty writeups I could find(till now)☆1,113Jan 21, 2026Updated last month
- ☆24Feb 26, 2026Updated last week
- Vulnerable-by-design solidity protocol to help Web3 security enthusiasts practice their skills in an environment closer to real live.☆148Jun 12, 2025Updated 8 months ago
- Public profile of my adventure as a blockchain and smart contract security auditor.☆77Nov 16, 2025Updated 3 months ago
- Gaining the most elusive of tips. Add your input and let's collect them all!☆353Mar 6, 2024Updated 2 years ago
- Certora's Formal Verification and Audit Portfolio – a comprehensive collection of smart contract security verification reports and audits…☆30Jan 13, 2026Updated last month
- A list of public fuzzing campaigns☆129Jan 24, 2026Updated last month
- Common security findings in smart contracts☆126Dec 16, 2022Updated 3 years ago
- Workshop about the different types of reentrancy attacks☆135Mar 25, 2025Updated 11 months ago
- The critical bug writeups☆137Oct 31, 2024Updated last year
- List of the public smart contract audit reports and security reviews performed by Hexens.☆55Feb 17, 2026Updated 2 weeks ago
- A collection of practical security-focused guides and checklists for Morpho smart contract development.☆26Apr 17, 2023Updated 2 years ago
- Audit portfolio of 0xSimao☆50Dec 17, 2025Updated 2 months ago
- Reproduce ZKP vulnerabilities☆321Nov 25, 2025Updated 3 months ago
- ☆13Nov 14, 2024Updated last year
- ☆30Feb 19, 2026Updated 2 weeks ago
- ☆13Jul 21, 2022Updated 3 years ago
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆133Dec 23, 2023Updated 2 years ago
- A curated list of smart contracts security audits checklists and resources.☆313Feb 4, 2026Updated last month
- Practical tips for building secure web3 projects at every stage, from the initial design to deployment☆74Aug 27, 2025Updated 6 months ago
- Audits and findings by MiloTruck☆178Jul 29, 2025Updated 7 months ago
- All the private and public audits that I have worked on.☆166Feb 24, 2026Updated last week
- ☆568Feb 26, 2026Updated last week
- ☆14Oct 29, 2025Updated 4 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- ☆31Apr 6, 2022Updated 3 years ago