SecurityInnovation / Smart-Contract-CTFLinks
A Blockchain And Smart Contract Based CTF
☆16Updated 2 years ago
Alternatives and similar repositories for Smart-Contract-CTF
Users that are interested in Smart-Contract-CTF are comparing it to the libraries listed below
Sorting:
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆150Updated 2 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆32Updated last year
- Disclosure reports by PepperSec☆20Updated 5 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆201Updated 5 years ago
- Geolocate your files!☆16Updated 3 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆32Updated 2 years ago
- Example Manticore scripts☆68Updated last year
- The Decentralized Application Security Project☆237Updated 4 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- ☆16Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Yet another Solidity decompiler, WIP☆42Updated 4 years ago
- ☆90Updated last year
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆142Updated 3 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- ☆10Updated 7 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- Solidity Contract Function Profiler☆82Updated 6 years ago
- ☆25Updated last year
- Ethereum smart contract reverse engineering☆102Updated 6 years ago
- A checklist of things to look for when auditing Solidity smart contracts.☆74Updated 7 years ago
- Collection of PoCs and exploits for DeFi and other Ethereum projects☆81Updated 3 years ago