Zellic / example-ctf-challenge
A self-contained example Ethereum challenge using Paradigm's CTF framework
☆28Updated 2 years ago
Alternatives and similar repositories for example-ctf-challenge:
Users that are interested in example-ctf-challenge are comparing it to the libraries listed below
- Practical fuzzing examples for the mastering fuzzing talk☆109Updated last year
- ☆74Updated last year
- A framework for assessing the security of L2s☆46Updated last year
- Public infra related to hosting Paradigm CTF☆110Updated last year
- A collection of Solana CTF challenges☆123Updated 2 years ago
- My swiss army knife for reversing EVM bytecodes (super experimental)☆117Updated 5 months ago
- Sui smart contract fuzzer☆35Updated last year
- A framework that references, categorizes, and mitigates blockchain attack vectors.☆24Updated last week
- Collection of CTFs for Fun and Interviewing Applicants☆136Updated last month
- ethpwn - the Swiss Army Knife for Smart Contract Hacking☆47Updated 4 months ago
- Scrappy bot army that automates web3 bug hunting workflows.☆102Updated last month
- A curated collection of tools, articles, research, and guides for fuzzing smart contracts on the Ethereum Virtual Machine (EVM).☆133Updated last month
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆53Updated 2 weeks ago
- Cairo/Starknet smart contract fuzzer☆122Updated last month
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆104Updated last year
- A collection of my security audits☆54Updated last month
- All the private and public audits that I have worked on.☆101Updated last week
- ☆29Updated last year
- Damn Vulnerable DeFi v4 Solutions☆42Updated 6 months ago
- An EVM Jump-Oriented Programming Puzzle in SECCON CTF 2023 Quals☆28Updated last year
- Sherlock audit and coverage reports☆126Updated this week
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆10Updated 2 weeks ago
- A detailed write-up of a solo critical vulnerability discovered during the Immunefi Attackathon, before the mainnet launch☆63Updated 4 months ago
- We created a cybersecurity Systematization of Knowledge for Solana applications and protocols. We call it the Solana Security Strategy: s…☆90Updated last year
- A comprehensive list of security practices for DeFi protocols.☆88Updated 5 months ago
- ☆99Updated 2 years ago
- Solidity CTF challenges for mrstealyocrypto.xyz (foundry)☆139Updated last year
- Framework for Solana CTF challenges☆60Updated 2 years ago
- ☆115Updated 3 years ago
- ☆115Updated last week