Quillhash / DeFi-anti-hack-checklistLinks
This repo contains anti-hack checklists, which will help projects to build and develop secure DeFi applications. If you find anything missing or want to update existing resources, you can create a pull request and contribute to the project.
☆32Updated 2 years ago
Alternatives and similar repositories for DeFi-anti-hack-checklist
Users that are interested in DeFi-anti-hack-checklist are comparing it to the libraries listed below
Sorting:
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆33Updated 3 years ago
- The purpose of this repo is to list all the related Research Papers focused on Smart-contracts security topics. As well as listing all th…☆44Updated 4 years ago
- Quill CTF is a game in which you hack Ethereum smart contracts to learn about security. The game is designed to educate players on how t…☆60Updated 2 years ago
- ☆115Updated 3 years ago
- A collection of my security audits☆55Updated 3 months ago
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆106Updated 2 years ago
- Identify flashloan bots in multiple chains☆34Updated 3 years ago
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- A BugBounty companion that checks out high-reward yielding bug bounty code-bases from Immunefi/code4rena 🙌 (use at own risk)☆69Updated last year
- A comprehensive list of security practices for DeFi protocols.☆86Updated last year
- ☆52Updated last year
- A curated list of major DeFi hacks along with their POCs in foundry☆82Updated last year
- This repository represents my portfolio of smart contract security audits and audit contest findings☆51Updated 9 months ago
- DeFi exploits for educational purposes☆61Updated 2 years ago
- ☆24Updated 3 years ago
- ☆21Updated 2 years ago
- The good, the bad, and the ugly of proxy implementations☆104Updated last year
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆60Updated last week
- CTF-like challenges of smart contracts☆62Updated 3 years ago
- ☆99Updated 2 years ago
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 3 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- zaskoh's smart contract security audits, reviews, and contributions☆49Updated 2 years ago
- ☆49Updated 2 years ago
- Audit-365 is a challenge for me where I will be posting educational content related to Smart contract auditing and web3 security througho…☆121Updated 2 years ago
- ☆15Updated 2 years ago
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆30Updated 9 months ago
- A curated list of awesome of the Foundry development framework.☆38Updated 2 years ago
- ☆54Updated last year
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆56Updated last year