Web3SecurityDAO / websiteLinks
☆20Updated 2 years ago
Alternatives and similar repositories for website
Users that are interested in website are comparing it to the libraries listed below
Sorting:
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆61Updated this week
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆107Updated 2 years ago
- ☆87Updated 4 months ago
- Identify flashloan bots in multiple chains☆34Updated 3 years ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆75Updated last year
- DeFi exploits for educational purposes☆60Updated 2 years ago
- ☆50Updated 2 years ago
- Collection of past CTFs to play and practice locally.☆52Updated last year
- CTF Writeups☆36Updated 2 years ago
- ☆47Updated 2 years ago
- ☆115Updated 3 years ago
- Writeup for solved challenges in Paradigm CTF 2022☆74Updated 3 years ago
- ☆102Updated last month
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆86Updated last month
- Optimised Uniswap V2 contracts written in Huff language☆113Updated last year
- ☆64Updated 2 years ago
- GasBad is an open-source project that evaluates gas efficiency in Solidity libraries☆70Updated last year
- ☆101Updated 2 years ago
- Console.log utility for debugging huff contracts☆69Updated 2 years ago
- Generate invariants for Foundry projects with LLM☆104Updated last year
- Quill CTF is a game in which you hack Ethereum smart contracts to learn about security. The game is designed to educate players on how t…☆60Updated 2 years ago
- Checklist for security audit of tron projects by @positivesecurity☆26Updated last year
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- SushiSwap RouteProcessor2 exploit repro + supporting data useful for whitehats.☆92Updated 2 years ago
- eBurger is a static analysis tool that provides a way to quickly query and analyze solidity smart contracts.☆37Updated last month
- ☆35Updated 2 months ago
- ☆54Updated 3 years ago
- This part of a small series of medium post dedicated to motivate myself while learning how the evm works.☆91Updated 7 months ago
- reproduce kyber-elastic exploit☆77Updated 2 years ago
- ☆108Updated last year