Hexens / remedy-ctf-2025View external linksLinks
☆25May 15, 2025Updated 9 months ago
Alternatives and similar repositories for remedy-ctf-2025
Users that are interested in remedy-ctf-2025 are comparing it to the libraries listed below
Sorting:
- Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines☆11Feb 13, 2023Updated 3 years ago
- anniversary-ctf☆10Aug 20, 2024Updated last year
- The smart contract security training ground for developers, security researchers and educators.☆13Sep 24, 2024Updated last year
- Damn Vulnerable DeFi (https://www.damnvulnerabledefi.xyz/) challenges ported to work with Brownie a Python-based development framework fo…☆10Aug 17, 2022Updated 3 years ago
- Challenges and Solutions of Blaz CTF 2023☆45Dec 5, 2023Updated 2 years ago
- Damn Vulnerable DeFi v4 Solutions☆51Sep 19, 2024Updated last year
- Protocol contracts for PreHTLC Atomic Swaps and Discovery☆30Updated this week
- ZK Circuit Fuzzer (IEEE S&P'26)☆37Nov 19, 2025Updated 2 months ago
- ☆35Jan 29, 2025Updated last year
- ☆173Jan 12, 2026Updated last month
- Contest submissions and bug bounties☆37Feb 9, 2026Updated last week
- ☆38Sep 23, 2024Updated last year
- A collection of resources to help you build better and more secure Solana programs. Kept up to date.☆554Dec 6, 2025Updated 2 months ago
- Decentralized/blokchain-based real-estate listing project using ERC721 (NFT), zero-knowledge proofs (zk-SNARKS / ZoKrates), and open mark…☆10Jan 1, 2022Updated 4 years ago
- ☆12Dec 19, 2023Updated 2 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- CTF challenges made by MiloTruck☆97Jul 3, 2025Updated 7 months ago
- The smart contract security training ground for developers, security researchers and educators.☆1,279Mar 21, 2025Updated 10 months ago
- List of the public smart contract audit reports and security reviews performed by Hexens.☆55Updated this week
- Struct-aware fuzzing framework + some fuzzers☆29Jan 28, 2026Updated 2 weeks ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Simple Tutorial for Web3 Security☆105Oct 20, 2024Updated last year
- ☆10Jul 1, 2025Updated 7 months ago
- ☆14Jun 9, 2022Updated 3 years ago
- Public repo for ETH Escape CTF @ Devcon 2024: https://devcon.org/☆13Dec 11, 2024Updated last year
- ☆13Nov 5, 2024Updated last year
- 天玄链一键部署脚本☆12Nov 26, 2024Updated last year
- ☆11Mar 8, 2023Updated 2 years ago
- ☆20Aug 31, 2025Updated 5 months ago
- ☆15Jan 24, 2023Updated 3 years ago
- A provider of random numbers through cryptography☆14Aug 22, 2022Updated 3 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- 天玄区块链智能合约应用Demo☆12Nov 26, 2024Updated last year
- ☆12Sep 19, 2024Updated last year
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- ☆14Oct 29, 2025Updated 3 months ago
- pwn envs based on docker of ubuntu16.04,18.04,20.04☆10Dec 4, 2022Updated 3 years ago
- ☆15Jul 14, 2024Updated last year
- Solidity ANTLR4 grammar Python parser☆13Mar 11, 2025Updated 11 months ago