audit-quality / security-checklistLinks
☆42Updated 7 months ago
Alternatives and similar repositories for security-checklist
Users that are interested in security-checklist are comparing it to the libraries listed below
Sorting:
- Scrapper for Immunefi☆43Updated last year
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆29Updated 4 months ago
- easy POC template generation from the command line☆74Updated 9 months ago
- ☆37Updated 11 months ago
- Diagrams for Solidity contracts☆47Updated last year
- ☆36Updated last year
- CTF challenges made by MiloTruck☆69Updated this week
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- ☆91Updated last year
- Series of CTF challenges based off real world smart contract vulnerabilities.☆27Updated last year
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆30Updated last year
- Content for Electisec Reports Site☆27Updated last week
- Public profile of my adventure as a blockchain and smart contract security auditor.☆71Updated 2 months ago
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- Readiness Assessment for CARE Endeavour☆54Updated last year
- Security Reviews and Audit Checklists☆121Updated 3 months ago
- Index of Rareskill Blog posts using playwright☆21Updated last year
- A Solidity code search tool with built-in static analysis detection☆74Updated 10 months ago
- Speed up your judging on Sherlock!☆16Updated 2 years ago
- Solidity Audit Report Generator☆85Updated last year
- APG (Auditor Profile Generator)☆35Updated last year
- List of Halmos resources.☆54Updated 3 months ago
- General purpose unopinionated Solidity fuzzing library for stateful and stateless fuzzing☆35Updated 2 months ago
- Proof of Concept of (now fixed) vulnerability in Notional smart contracts☆41Updated 2 years ago
- A static analyzer for Solidity, built upon regex and ASTs.☆25Updated last year
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆72Updated last year
- A simple tool for security researchers to monitor code-changes that silently fix bugs or introduce new ones, across multiple repositories…☆36Updated 5 months ago
- ☆86Updated 2 months ago
- ☆49Updated 2 years ago
- Formally verifying consistency between Solmate and Solady using Halmos☆54Updated 9 months ago