PositiveSecurity / tron-audit-guideLinks
Checklist for security audit of tron projects by @positivesecurity
☆26Updated last year
Alternatives and similar repositories for tron-audit-guide
Users that are interested in tron-audit-guide are comparing it to the libraries listed below
Sorting:
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- Damn Vulnerable DeFi v4 Solutions☆47Updated last year
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆60Updated last week
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆80Updated this week
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆107Updated 2 years ago
- Diagrams for Solidity contracts☆47Updated last year
- Collection of past CTFs to play and practice locally.☆52Updated last year
- Public profile of my adventure as a blockchain and smart contract security auditor.☆74Updated 4 months ago
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- A collection of my security audits☆55Updated 3 months ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆75Updated last year
- Index of Rareskill Blog posts using playwright☆21Updated last year
- ☆47Updated 2 years ago
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- DeFi exploits for educational purposes☆61Updated 2 years ago
- ☆15Updated 2 years ago
- Casual Glider guides and tips☆34Updated 10 months ago
- General purpose unopinionated Solidity fuzzing library for stateful and stateless fuzzing☆52Updated last month
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆30Updated 10 months ago
- Web3.0 Audit Resources and Competition Materials☆19Updated this week
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- Series of CTF challenges based off real world smart contract vulnerabilities.☆29Updated last year
- ☆49Updated 2 years ago
- The good, the bad, and the ugly of proxy implementations☆104Updated last year
- ☆32Updated 3 years ago
- ☆87Updated 2 months ago
- ☆115Updated 3 years ago
- ☆54Updated last year
- List of the public smart contract audit reports and security reviews performed by Hexens.☆46Updated 2 weeks ago
- Halmos vs Damn Vulnerable DeFi is the series of articles about solving the Damn Vulnerable DeFi CTF using the Halmos symbolic analyzer.☆33Updated 8 months ago