CDSecurity / audits
☆123Updated 2 weeks ago
Related projects: ⓘ
- Portfolio of my work.☆65Updated 7 months ago
- This repository represents my portfolio of smart contract security audits and audit contest findings☆51Updated 2 months ago
- Audits and findings by MiloTruck☆146Updated 2 weeks ago
- Common security findings in smart contracts☆118Updated last year
- ☆25Updated 6 months ago
- Smart Contract Audits and Findings by @0xJuancito☆27Updated 3 months ago
- Sherlock audit and coverage reports☆112Updated last week
- A collection of solo audit reports by web3 security experts☆95Updated last year
- ☆173Updated last week
- ☆41Updated 8 months ago
- ☆185Updated last year
- Adding Defi Vulnerabilities.☆150Updated last year
- Pre-built security properties for commonly forked DeFi protocols☆194Updated 10 months ago
- Practical fuzzing examples for the mastering fuzzing talk☆106Updated last year
- Every time a Bug Bounty Program in Immunefi modifies its policy, assets-in-scope, or bounties-table, a bot will commit those changes to t…☆32Updated this week
- Public profile of my adventure as a blockchain and smart contract security auditor.☆66Updated 3 months ago
- Collection of different smart contract security audits I performed.☆34Updated 4 months ago
- Shieldify's public audits portfolio☆172Updated last week
- ☆106Updated 6 months ago
- A library of blockchain security resources for various categories in blockchain.☆116Updated last month
- Security Reviews and Audit Checklists☆91Updated 4 months ago
- Personal portfolio of audits that I have participated in.☆54Updated 3 months ago
- The good, the bad, and the ugly of proxy implementations☆104Updated 8 months ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆97Updated 7 months ago
- Solidity CTF challenges for mrstealyocrypto.xyz (foundry)☆132Updated 9 months ago
- public audit & bug reports☆258Updated 6 months ago
- We created a cybersecurity Systematization of Knowledge for Solana applications and protocols. We call it the Solana Security Strategy: s…☆76Updated 8 months ago
- ☆49Updated 9 months ago
- Ethernaut Challenges Solutions with Foundry - By JohnnyTime☆53Updated 8 months ago
- ☆50Updated 9 months ago