Hexens / piller
Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines
☆11Updated 2 years ago
Alternatives and similar repositories for piller:
Users that are interested in piller are comparing it to the libraries listed below
- Fast paced learning group for ZK enthusiasts focused on circuit development & Security☆34Updated last year
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Updated last year
- ☆18Updated last month
- Secp256k1 Elliptic Curve Library Written In Huff☆5Updated last year
- Tstore huff template☆17Updated last year
- Mutation testing tool for circom☆16Updated last year
- ☆12Updated last year
- ☆12Updated last year
- Directory with previous Curta puzzlest that were hosted on Curta.wtf☆11Updated 8 months ago
- Hyper-Optimised Secp256r1/P256 Verifier Huff Implementation☆26Updated last year
- An NFT with Huff, using polynomials over a finite field with order largest prime address, instead of mappings.☆15Updated 6 months ago
- Example of the whitehack for Curve exploit 30/07/23☆19Updated last year
- A regex virtual machine for full featured pattern matching on Ethereum Virtual Machine.☆20Updated 3 months ago
- My personal notebook for various zk-related topics☆48Updated 2 months ago
- Plonk verifier in solidity (using Commit api)☆21Updated 9 months ago
- Code used in a recent presentation showing off noir storage proofs☆14Updated last year
- simple zk implementations in python☆24Updated 10 months ago
- SolChip8 is the first 100% on-chain Chip8 emulator smart contract where you can run chip8 games on EVM☆31Updated 4 months ago
- ☆47Updated 6 months ago
- Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff☆25Updated 2 years ago
- MEV Olympics☆45Updated 3 months ago
- ☆19Updated last year
- Contains several examples and challenges to use Lambdaworks☆15Updated last year
- Groth16 implementation in Python. Final project of RareSkills ZK bootcamp cohort 8.☆12Updated 9 months ago
- A collection of resources relevant to the PSE Security Team.☆12Updated last year
- ☆11Updated last year
- ☆63Updated 2 years ago
- ☆44Updated 4 months ago
- A minimal based rollup implementation that is easy to understand and extend☆29Updated this week
- A Rust macro for quickly unwrapping a refutable pattern.☆11Updated last year