SecurityInnovation / Smart-Contract-CTF
A Blockchain And Smart Contract Based CTF
☆16Updated last year
Alternatives and similar repositories for Smart-Contract-CTF:
Users that are interested in Smart-Contract-CTF are comparing it to the libraries listed below
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆30Updated 5 months ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 3 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- Smart contract auditing assistant tool for Truffle Framework.☆18Updated 2 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated last year
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 2 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 4 years ago
- A Purposefully Vulnerable Blockchain☆50Updated 3 years ago
- The Trail of Bits Truffle Security Toolbox☆24Updated last year
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 5 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆116Updated 6 years ago
- CLI client for the MythX API☆20Updated 2 years ago
- Disclosure reports by PepperSec☆19Updated 4 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 6 years ago
- Bricks is a sandbox and instruction manual collection for building smart contract exploits for Ethereum blockchains, designed to help dev…☆26Updated 4 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 5 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- My key take-aways from reviewing vulnerable Solidity smart contracts☆9Updated 2 years ago
- Geolocate your files!☆16Updated 3 years ago
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆18Updated 9 months ago
- ☆11Updated 3 years ago
- A checklist of things to look for when auditing Solidity smart contracts.☆71Updated 6 years ago
- Sometimes Ethereum nodes are vulnerable to a JSON-RPC exploit - this is a handful of scripts to secure those funds.☆8Updated 6 years ago
- A series of attack tests on commonly used libraries and contracts in the ethereum web space☆20Updated 6 years ago
- Solidity Contract Function Profiler☆81Updated 6 years ago
- http://hackthiscontract.io/☆49Updated 2 years ago