SecurityInnovation / Smart-Contract-CTFLinks
A Blockchain And Smart Contract Based CTF
☆17Updated 2 years ago
Alternatives and similar repositories for Smart-Contract-CTF
Users that are interested in Smart-Contract-CTF are comparing it to the libraries listed below
Sorting:
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 7 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆153Updated 2 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆33Updated last year
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- ☆17Updated 4 years ago
- Example Manticore scripts☆68Updated 2 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆198Updated 6 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Updated 4 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 4 years ago
- The Decentralized Application Security Project☆238Updated 5 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆146Updated 4 years ago
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Updated last year
- Disclosure reports by PepperSec☆20Updated 5 years ago
- Geolocate your files!☆16Updated 4 years ago
- BlockChain-Security-List☆105Updated 7 years ago
- ☆20Updated 11 years ago
- Ethereum smart contract reverse engineering☆104Updated 7 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆32Updated 3 years ago
- ☆26Updated last year
- an awesome list of honeypot resources☆10Updated 8 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- This repo contains a collection of smart contract honeypots.☆294Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Yet another Solidity decompiler, WIP☆41Updated 5 years ago
- The purpose of this document is to gather public information on vulnerabilities introduced on Blockchains software.☆14Updated 6 years ago