ElliotFriedman / poc-templateLinks
Smart contract exploit proof of concept exploit standard interface
☆16Updated last year
Alternatives and similar repositories for poc-template
Users that are interested in poc-template are comparing it to the libraries listed below
Sorting:
- APG (Auditor Profile Generator)☆35Updated last year
- Readiness Assessment for CARE Endeavour☆54Updated last year
- Here you will find set of questions and solutions which will be useful to level up our solidity programming as well as ace our interviews…☆23Updated 2 years ago
- Exercises for the Yield 2022 Mentorship progam☆61Updated 3 years ago
- Content for Electisec Reports Site☆27Updated 2 weeks ago
- ☆55Updated last year
- box of chocolates☆21Updated last week
- ☆36Updated last year
- ☆91Updated last month
- ☆60Updated last year
- ☆12Updated 8 months ago
- Series of CTF challenges based off real world smart contract vulnerabilities.☆27Updated last year
- A static analyzer for Solidity, built upon regex and ASTs.☆26Updated last year
- easy POC template generation from the command line☆74Updated 10 months ago
- Diagrams for Solidity contracts☆47Updated last year
- A markdown based template for writing spearbit reports☆33Updated 11 months ago
- ☆55Updated 6 months ago
- Solidity Audit Report Generator☆85Updated last year
- One click magically working Foundry + Medusa + Echidna Starter☆41Updated last week
- Mutation Testing for Ethereum Smart Contracts, support for Foundry☆127Updated 10 months ago
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆31Updated last year
- ☆36Updated 2 years ago
- CTF challenges made by MiloTruck☆93Updated last week
- Use cursed ERC20s in foundry unit tests☆144Updated 2 years ago
- ☆135Updated last year
- A collection of my personal security audits☆68Updated 2 months ago
- ☆91Updated last year
- Personal portfolio of audits that I have participated in.☆56Updated last month
- This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed…☆112Updated last month
- ☆57Updated last year