banteg / evil-jarLinks
evil jar attack technical post-mortem
☆141Updated 4 years ago
Alternatives and similar repositories for evil-jar
Users that are interested in evil-jar are comparing it to the libraries listed below
Sorting:
- POC for DeFi Vulnerabilities☆198Updated 3 years ago
- Security contacts and disclosure reports☆200Updated 2 weeks ago
- ☆196Updated 3 years ago
- Ethereum (EVM) smart contracts reverse engineering helper utility☆231Updated 3 years ago
- ☆98Updated 2 years ago
- ☆119Updated 3 years ago
- The repository contains a runnable POC for uninitialized wormhole implementation contract☆74Updated 2 years ago
- ☆90Updated last year
- Exploiting a Uniswap exchange that uses an ERC777 token by leveraging the reentrant microtrading attack vector☆172Updated 2 years ago
- 🧠 A scriptable semantic grep utility for solidity☆145Updated last year
- Rapid Smart Contract Crawler☆205Updated last year
- ☆55Updated 3 years ago
- Materials related to security: docs, checklists, processes, etc...☆203Updated last month
- Ethereum/EVM Node Security Toolkit☆70Updated last year
- the magic X-ray machine for solidity smart contracts☆175Updated 3 years ago
- List of CTF related to Ethereum world (solidity smart contracts)☆124Updated 3 years ago
- Simplify Ethereum security analysis and testing☆340Updated 7 months ago
- ☆40Updated last year
- Disclosure reports by PepperSec☆20Updated 5 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆152Updated 2 years ago
- Barebones Solidity smart contract fuzzer☆96Updated 3 years ago
- An ethereum evm bytecode disassembler and static/dynamic analysis tool☆221Updated 6 years ago
- Deploy solidity contracts with ethers.js and CREATE2☆77Updated last year
- Monitor smart contracts deployed on blockchain and test against vulnerabilities with Mythril. It was presented at DEFCON 2019.☆315Updated 4 months ago
- Ethereum transaction decoder (community version).☆269Updated 2 years ago
- ☆135Updated last month
- Analyze and reproduce attack events or vulnerabilities in the blockchain world.☆353Updated 3 years ago
- ☆11Updated 3 years ago
- ☆52Updated 6 years ago
- ☆242Updated this week