SecurityInnovation / Smart-Contract-CTFLinks
A Blockchain And Smart Contract Based CTF
☆17Updated 2 years ago
Alternatives and similar repositories for Smart-Contract-CTF
Users that are interested in Smart-Contract-CTF are comparing it to the libraries listed below
Sorting:
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 7 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated 2 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆33Updated last year
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆153Updated 2 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- The Decentralized Application Security Project☆239Updated 5 years ago
- ☆27Updated last year
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Updated 4 years ago
- ☆17Updated 4 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆199Updated 6 years ago
- Geolocate your files!☆16Updated 4 years ago
- Example Manticore scripts☆68Updated 2 years ago
- Forensics acquisition framework designed to be extensible and secure☆125Updated 6 years ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 3 years ago
- Ethereum smart contract reverse engineering☆104Updated 7 years ago
- BlockChain-Security-List☆105Updated 7 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Updated last year
- Disclosure reports by PepperSec☆20Updated 5 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆146Updated 4 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆19Updated 4 years ago
- ☆11Updated last year
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25Updated 4 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆32Updated 3 years ago
- A crawling framework for blockchains and peer-to-peer systems☆46Updated 2 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 4 years ago
- Smart contract auditing assistant tool for Truffle Framework.☆17Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago