HardlyCodeMan / audit_helperLinks
Boilerplate test creation and Foundry initialisation for solidity smart contract audits
☆20Updated 2 years ago
Alternatives and similar repositories for audit_helper
Users that are interested in audit_helper are comparing it to the libraries listed below
Sorting:
- Scrapper for Immunefi☆43Updated last year
- easy POC template generation from the command line☆74Updated last year
- ☆45Updated 11 months ago
- ☆49Updated 2 years ago
- Public profile of my adventure as a blockchain and smart contract security auditor.☆73Updated 2 months ago
- APG (Auditor Profile Generator)☆35Updated last year
- Diagrams for Solidity contracts☆47Updated last year
- A markdown based template for writing spearbit reports☆68Updated 3 years ago
- ☆55Updated last month
- A collection of my security audits☆54Updated last month
- Readiness Assessment for CARE Endeavour☆55Updated last year
- Personal portfolio of audits that I have participated in.☆57Updated last month
- ☆35Updated last year
- ☆115Updated 3 years ago
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- ☆37Updated last year
- Proof of Concept of (now fixed) vulnerability in Notional smart contracts☆41Updated 2 years ago
- Exercises for the Yield 2022 Mentorship progam☆61Updated 3 years ago
- Index of Rareskill Blog posts using playwright☆21Updated last year
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Updated 2 years ago
- ☆102Updated 3 years ago
- ☆22Updated 2 years ago
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆30Updated 8 months ago
- A static analyzer for Solidity, built upon regex and ASTs.☆26Updated last year
- CTF challenges made by MiloTruck☆95Updated 2 months ago
- Security Reviews and Audit Checklists☆122Updated last month
- Content for Electisec Reports Site☆27Updated this week
- Use cursed ERC20s in foundry unit tests☆144Updated 2 years ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- The good, the bad, and the ugly of proxy implementations☆104Updated last year