MetaTrustLabs / ctf
☆27Updated last year
Alternatives and similar repositories for ctf:
Users that are interested in ctf are comparing it to the libraries listed below
- Numen Cyber Smart Contract CTF☆46Updated 2 years ago
- ☆35Updated 6 months ago
- Challenges and Solutions of Blaz CTF 2023☆44Updated last year
- Solutions for Solidity challenges in MetaTrust CTF September 2023.☆20Updated last year
- Challenges for the ONLYPWNER CTF Platform☆43Updated 4 months ago
- ☆74Updated last year
- Public infra related to hosting Paradigm CTF☆110Updated last year
- ⚡️ Ethernaut CTF 2024 Challenges & Solutions☆112Updated last year
- Girl Friend <- Generate Foundry Fork Test from Attack Transaction☆117Updated 7 months ago
- A curated list of awesome ton security resources☆30Updated 3 months ago
- ☆13Updated last year
- My swiss army knife for reversing EVM bytecodes (super experimental)☆117Updated 5 months ago
- ☆98Updated 2 years ago
- ☆101Updated 2 years ago
- Web3 CTF Intensive CoLearning☆127Updated this week
- SolidCTF is an infrastructure solution that simplifies the build of Solidity CTF challenges.☆142Updated last year
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆71Updated 11 months ago
- Damn Vulnerable DeFi v4 Solutions☆42Updated 6 months ago
- A smart contract security search utility☆74Updated 3 months ago
- Contest submissions and bug bounties☆34Updated last month
- DeFi Security Breaches: Comprehensive Root Cause Analysis☆57Updated 6 months ago
- ☆50Updated 8 months ago
- Barebones Solidity smart contract fuzzer☆94Updated 2 years ago
- CTF challenges made by MiloTruck☆67Updated 7 months ago
- Template repository intended to ease fuzzing components of Solidity projects, especially libraries.☆207Updated last year
- Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.☆45Updated 5 months ago
- ☆39Updated 11 months ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆86Updated last year
- ☆86Updated 2 weeks ago
- The good, the bad, and the ugly of proxy implementations☆105Updated last year