☆45Oct 16, 2024Updated last year
Alternatives and similar repositories for security-checklist
Users that are interested in security-checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common security findings in smart contracts☆126Dec 16, 2022Updated 3 years ago
- ☆21Mar 31, 2022Updated 3 years ago
- General purpose unopinionated Solidity fuzzing library for stateful and stateless fuzzing☆59Jan 18, 2026Updated 2 months ago
- ☆15Jun 24, 2023Updated 2 years ago
- easy POC template generation from the command line☆77Aug 30, 2024Updated last year
- A collection of practical security-focused guides and checklists for Morpho smart contract development.☆26Apr 17, 2023Updated 2 years ago
- Go-to compilation of smart contract proxy information, for discerning devs and auditors☆23Mar 25, 2025Updated 11 months ago
- Bugs in commonly forked DeFi protocols☆489Oct 3, 2025Updated 5 months ago
- A tool to automatically generate Foundry unit test cases from Echidna and Medusa failed properties☆118Aug 25, 2025Updated 6 months ago
- Resources for the budding field of risk modelling and analysis in DeFi☆164Apr 25, 2024Updated last year
- ☆13Jul 21, 2022Updated 3 years ago
- ☆10Sep 22, 2022Updated 3 years ago
- A list of public fuzzing campaigns☆129Jan 24, 2026Updated last month
- Hacks/Vulns/Audits Compilation☆163Sep 5, 2024Updated last year
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Apr 18, 2023Updated 2 years ago
- ☆46Mar 8, 2024Updated 2 years ago
- Arachne is a scaffolding framework built to streamline the development of large-scale fuzzing suites.☆18Dec 18, 2025Updated 3 months ago
- ☆137Dec 23, 2025Updated 3 months ago
- Identify flashloan bots in multiple chains☆34Oct 26, 2022Updated 3 years ago
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆88Dec 2, 2025Updated 3 months ago
- public audit & bug reports☆277Oct 7, 2024Updated last year
- Adding Defi Vulnerabilities.☆168Nov 17, 2022Updated 3 years ago
- Example of the whitehack for Curve exploit 30/07/23☆19Aug 3, 2023Updated 2 years ago
- ☆37Jun 24, 2024Updated last year
- A comprehensive guide to teach you about gas optimization patterns.☆26Aug 24, 2023Updated 2 years ago
- ☆88Sep 3, 2025Updated 6 months ago
- Slither Detectors by Pessimistic.io☆373Jun 25, 2024Updated last year
- 🍋 An open dataset containing smart contract audit issues from various sources.☆236Mar 21, 2024Updated 2 years ago
- Template repository intended to ease fuzzing components of Solidity projects, especially libraries.☆214Dec 25, 2023Updated 2 years ago
- The good, the bad, and the ugly of proxy implementations☆104Jan 19, 2024Updated 2 years ago
- A one-stop shop for blockchain security researchers looking for educational material and alpha to level-up and get an edge on competition…☆404Mar 1, 2026Updated 3 weeks ago
- Pre-built security properties for commonly forked DeFi protocols☆196Nov 7, 2023Updated 2 years ago
- ☆116Feb 27, 2022Updated 4 years ago
- Collection of security reviews of ZK Protocols☆241Dec 1, 2024Updated last year
- Collection of PoCs and exploits for DeFi and other Ethereum projects☆83Aug 5, 2022Updated 3 years ago
- Scrapper for Immunefi☆47May 28, 2024Updated last year
- ☆286Jan 19, 2026Updated 2 months ago
- ☆15Nov 2, 2022Updated 3 years ago
- PoC of KyberSwap double liquidity add exploit☆42Aug 30, 2023Updated 2 years ago