MEDGA-eth / EDBLinks
EDB: The EVM Project Debugger
☆33Updated this week
Alternatives and similar repositories for EDB
Users that are interested in EDB are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆36Updated last year
- DeFiVulnLabsCosmWasm☆50Updated 2 years ago
- Generate invariants for Foundry projects with LLM☆101Updated 11 months ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆76Updated 2 weeks ago
- ☆39Updated last year
- ☆11Updated 2 years ago
- Barebones Solidity smart contract fuzzer☆96Updated 3 years ago
- Checklist for security audit of tron projects by @positivesecurity☆23Updated 11 months ago
- Smart Contract Fuzzing Towards Profitable Vulnerabilities☆51Updated last month
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆72Updated last year
- Sol-azy is a modular CLI toolchain for static analysis and reverse engineering of Solana sBPF programs☆61Updated last month
- ☆17Updated 10 months ago
- ☆80Updated last year
- A Symbolic Ethereum Virtual Machine (EVM) bytecode interpreter, parser and decompiler, along with several other utils for programmaticall…☆97Updated 5 months ago
- ☆20Updated 2 years ago
- ☆38Updated 11 months ago
- A smart contract security search utility☆74Updated 8 months ago
- A curated list of awesome Solana security resources☆62Updated last year
- PoC of KyberSwap double liquidity add exploit☆43Updated last year
- Halmos vs Damn Vulnerable DeFi is the series of articles about solving the Damn Vulnerable DeFi CTF using the Halmos symbolic analyzer.☆33Updated 6 months ago
- Girl Friend <- Generate Foundry Fork Test from Attack Transaction☆121Updated last year
- A simple multiplexer contract to execute a sequence of transactions.☆48Updated 2 months ago
- DeFi exploits for educational purposes☆61Updated 2 years ago
- ☆41Updated 2 years ago
- PoC Exploit of a soundness bug exploit in the zkSync Era ZK-circuits☆37Updated 6 months ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆58Updated last week
- Practical examples of the Rust Ethereum Virtual Machine☆65Updated 11 months ago
- Numen Cyber Smart Contract CTF☆46Updated 2 years ago
- reproduce kyber-elastic exploit☆76Updated last year
- ☆12Updated last year