RareSkills / Buggy-ERC-20Links
☆47Updated 4 months ago
Alternatives and similar repositories for Buggy-ERC-20
Users that are interested in Buggy-ERC-20 are comparing it to the libraries listed below
Sorting:
- CTF challenges made by MiloTruck☆96Updated last month
- A list of public fuzzing campaigns☆120Updated last month
- The critical bug writeups☆122Updated 9 months ago
- ☆96Updated last month
- This repository contains a curated collection of resources focused on auditing Move smart contracts. It includes tools, best practices, c…☆114Updated 2 months ago
- ☆112Updated last year
- ☆62Updated 6 months ago
- List of awesome blogs and podcasts about web3 security and more☆80Updated 6 months ago
- weird ERC721 (NFTs) tokens☆83Updated 6 months ago
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆127Updated last year
- ☆47Updated last year
- Security Reviews and Audit Checklists☆123Updated 2 weeks ago
- ☆57Updated last year
- A set of exercises to practice Yul☆94Updated 5 months ago
- Roadmap to get up to speed with CosmWasm smart contract audits and security vulnerabilities☆97Updated last year
- ☆38Updated 9 months ago
- A curated list of smart contracts security audits checklists and resources.☆229Updated 3 weeks ago
- Solo High severity findings from contests 2024☆29Updated 7 months ago
- A repository to house all the links, notes, photos, and random thoughts from previous D-squared YouTube recordings☆125Updated last year
- ☆36Updated 2 years ago
- Practical tips for building secure web3 protocols at every stage, from the initial design to deployment☆64Updated this week
- A curated collection of tools, frameworks, and methodologies for testing and verifying Solidity smart contracts.☆73Updated last year
- ☆61Updated last week
- A comparison of solidity fuzzing tools Foundry, Echidna & Medusa☆169Updated 6 months ago
- Simple Tutorial for Web3 Security☆91Updated 9 months ago
- We are systematizing everything we know about Solana security into one structured resource: the Solana Security Strategy. It’s a field-te…☆165Updated last week
- ☆44Updated 6 months ago
- Reproduce ZKP vulnerabilities☆244Updated 5 months ago
- ☆32Updated 2 years ago
- Primers for Specialist AI Smart Contract Auditors☆184Updated last week