MoveMaverick / move-vulnerability-databaseLinks
Move Vulnerability Database
☆63Updated 2 months ago
Alternatives and similar repositories for move-vulnerability-database
Users that are interested in move-vulnerability-database are comparing it to the libraries listed below
Sorting:
- A framework that references, categorizes, and mitigates blockchain attack vectors.☆87Updated 8 months ago
- ☆88Updated 2 years ago
- A curated collection of tools, articles, research, and guides for fuzzing smart contracts on the Ethereum Virtual Machine (EVM).☆197Updated last month
- Challenges for the ONLYPWNER CTF Platform☆51Updated last year
- Daily activity feed of bug fixes and code changes in GitHub repositories listed as assets in scope for bug bounty programs in Immunefi.☆64Updated 3 months ago
- Damn Vulnerable DeFi v4 Solutions☆51Updated last year
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆88Updated 2 months ago
- Resources to learn Wallet Security☆53Updated 5 months ago
- ☆69Updated 2 years ago
- My swiss army knife for reversing EVM bytecodes (super experimental)☆126Updated 2 months ago
- Practical fuzzing examples for the mastering fuzzing talk☆109Updated 2 years ago
- ☆38Updated last year
- CTF challenges made by MiloTruck☆97Updated 7 months ago
- ☆49Updated last year
- This repository contains a curated collection of resources focused on auditing Move smart contracts. It includes tools, best practices, c…☆149Updated 8 months ago
- Smart Contract Audits and Findings by @0xJuancito☆30Updated last year
- A detailed write-up of a solo critical vulnerability discovered during the Immunefi Attackathon, before the mainnet launch☆68Updated 8 months ago
- ☆58Updated last year
- BugBounty-Tips☆28Updated 2 months ago
- ☆44Updated this week
- ☆47Updated 2 months ago
- All the private and public audits that I have worked on.☆163Updated last month
- Contest submissions and bug bounties☆37Updated last month
- A smart contract security search utility☆76Updated last year
- ⚡️ Ethernaut CTF 2024 Challenges & Solutions☆116Updated last year
- Common security findings in smart contracts☆126Updated 3 years ago
- Simple Tutorial for Web3 Security☆105Updated last year
- The good, the bad, and the ugly of proxy implementations☆104Updated 2 years ago
- Every time a Bug Bounty Program in Immunefi modifies its policy, assets-in-scope, or bounties-table, a bot will commit those changes to t…☆70Updated this week
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆75Updated last month