Checklist for security audit of ZKP projects by @positivesecurity
☆34Sep 12, 2024Updated last year
Alternatives and similar repositories for zk-audit-guide
Users that are interested in zk-audit-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Checklist for security audit of tron projects by @positivesecurity☆26Sep 11, 2024Updated last year
- Checklist for security audit of TON projects by @PositiveSecurity☆46Feb 26, 2025Updated last year
- CTF challenges made by MiloTruck☆99Jul 3, 2025Updated 8 months ago
- ☆20Nov 28, 2024Updated last year
- ☆12Nov 13, 2024Updated last year
- ☆13Nov 14, 2024Updated last year
- Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines☆11Feb 13, 2023Updated 3 years ago
- Groth16 fraud proof generation PoC using leaked toxic waste. Forked and modified from Arkworks' Rust implementation of the Groth16 zkSNAR…☆11Oct 10, 2023Updated 2 years ago
- ☆19Oct 2, 2024Updated last year
- Create breakpoints for use with Foundry debugger -- https://book.getfoundry.sh/cheatcodes/breakpoint☆33Oct 31, 2023Updated 2 years ago
- ☆67Jan 26, 2025Updated last year
- Mutation testing tool for circom☆17Jul 4, 2023Updated 2 years ago
- A new type of zk-EVM for L2 rollup☆10Feb 1, 2025Updated last year
- Better assertion macros for pure Huff tests.☆19Oct 2, 2023Updated 2 years ago
- Reproduce ZKP vulnerabilities☆324Nov 25, 2025Updated 3 months ago
- Track the values and addresses of slots (storage variables in Solidity) inside the Ethereum contract, as well as tracking logs (Solidity …☆45Jun 18, 2024Updated last year
- A repo to for sharing information on Substrate security☆20Feb 19, 2024Updated 2 years ago
- Verify JWTs using SNARK circuits☆29Jul 15, 2024Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Foundry + Yul puzzles☆33Aug 8, 2023Updated 2 years ago
- Code used in a recent presentation showing off noir storage proofs☆15Jul 30, 2023Updated 2 years ago
- Solidity exploits & challenges.☆76Jan 21, 2025Updated last year
- ☆14Jun 27, 2024Updated last year
- ☆113Mar 6, 2024Updated 2 years ago
- Not so awesome Web3 Security Reasearcher roadmap by tpiliposian☆293Apr 5, 2025Updated 11 months ago
- FRI low-degree-testing & polynomial commitment scheme☆24Mar 26, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- ☆17Sep 10, 2025Updated 6 months ago
- Using Dynamic Huffidity to embed MiMCSponge Hash bytecode by tornado cash to a solidity contract.☆10Sep 8, 2023Updated 2 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- ☆24Dec 20, 2024Updated last year
- halo2-lib-eddsa☆11Feb 2, 2024Updated 2 years ago
- A collection of resources relevant to the PSE Security Team.☆12Apr 17, 2023Updated 2 years ago
- Content for yAudit Reports Site☆29Mar 5, 2026Updated 2 weeks ago
- Akropolis C2FC Implementation (early stage)☆14Aug 5, 2019Updated 6 years ago
- The Noir library for the Fraction data type, maintained by Resurgence Labs.☆11Jul 30, 2024Updated last year
- Open-Source Libraries for Circom by ABDK Consulting☆19Dec 22, 2019Updated 6 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Feb 16, 2024Updated 2 years ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Jun 15, 2023Updated 2 years ago