MikeSpa / ethereum-exploit
Analysis of the major exploits that took place on the Ethereum blockchain
☆13Updated 2 years ago
Alternatives and similar repositories for ethereum-exploit:
Users that are interested in ethereum-exploit are comparing it to the libraries listed below
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated 9 months ago
- ☆10Updated 8 months ago
- An EVM Jump-Oriented Programming Puzzle in SECCON CTF 2023 Quals☆28Updated last year
- This repository implements a Python function that recovers the private key from two different signatures that use the same random nonce d…☆89Updated 2 weeks ago
- A mempool listener for contract specific transactions.☆11Updated 5 months ago
- notes & writeups for some CTF challenges☆9Updated last year
- PoC of the Hundred Finance March 2022 exploit☆10Updated 2 years ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆50Updated 11 months ago
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆25Updated 6 months ago
- Fuzzing campaign for https://github.com/drips-network/contracts☆10Updated 11 months ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆48Updated last week
- ☆25Updated 9 months ago
- ☆21Updated 2 years ago
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆34Updated 2 years ago
- A collection of investigation reports analyzed with MetaSleuth, a crypto fund flow visualization and analysis tool powered by @blocksecte…☆17Updated last year
- A test suite to check for client-side script injection on websites that display NFTs.☆52Updated last year
- Damn Vulnerable DeFi v4 Solutions☆37Updated 4 months ago
- A framework for assessing the security of L2s☆44Updated last year
- ☆19Updated last year
- KYC without doxxing yourself. Prove your identity to a third party without disclosing it.☆41Updated last year
- Curation of DevSecOps tools that all work together inside the minimum amount of containers. Just run make exec and read the How To!☆20Updated 2 months ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 2 years ago
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- My key take-aways from reviewing vulnerable Solidity smart contracts☆9Updated 2 years ago
- Tool and testing methodology for subjecting blockchain devnets to simulated network and side channel attacks☆68Updated 6 months ago
- Solutions to the Capture The Ether CTF challenges ⛳️☆12Updated last year
- Writeup for solved challenges in Paradigm CTF 2022☆76Updated 2 years ago
- CTF Writeups☆37Updated last year