SunWeb3Sec / damn-vulnerable-defi-v4-solutionsLinks
Damn Vulnerable DeFi v4 Solutions
☆51Updated last year
Alternatives and similar repositories for damn-vulnerable-defi-v4-solutions
Users that are interested in damn-vulnerable-defi-v4-solutions are comparing it to the libraries listed below
Sorting:
- DeFi Security Breaches: Comprehensive Root Cause Analysis☆81Updated 6 months ago
- Web3.0 Audit Resources and Competition Materials☆19Updated last week
- CTF challenges made by MiloTruck☆97Updated 6 months ago
- ☆55Updated 2 years ago
- Security Reviews and Audit Checklists☆131Updated 6 months ago
- ☆87Updated 2 years ago
- The good, the bad, and the ugly of proxy implementations☆104Updated 2 years ago
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆75Updated last month
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆30Updated last year
- Public profile of my adventure as a blockchain and smart contract security auditor.☆77Updated 2 months ago
- Practical fuzzing examples for the mastering fuzzing talk☆109Updated 2 years ago
- A curated collection of tools, frameworks, and methodologies for testing and verifying Solidity smart contracts.☆78Updated last year
- Smart contract auditing portfolio☆36Updated 5 months ago
- This repository represents my portfolio of smart contract security audits and audit contest findings☆51Updated last year
- ☆47Updated 2 years ago
- ☆59Updated last year
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Updated 2 years ago
- A comparison of solidity fuzzing tools Foundry, Echidna & Medusa☆179Updated 11 months ago
- Pre-built security properties for commonly forked DeFi protocols☆198Updated 2 years ago
- A recreation of capturetheether.com using Solidity 0.8.0 and the foundry environment.☆91Updated last year
- ☆42Updated 5 months ago
- Girl Friend <- Generate Foundry Fork Test from Attack Transaction☆127Updated last year
- Portfolio of my work.☆68Updated last year
- Personal portfolio of audits that I have participated in.☆58Updated 2 months ago
- Workshop about the different types of reentrancy attacks☆134Updated 10 months ago
- ☆32Updated last year
- ☆91Updated 2 years ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆88Updated last month
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆133Updated 2 years ago
- ☆49Updated last year