best-practicers / resources
Resources for best practicers
☆25Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for resources
- Solidity codebase reviews by the Best Practicers☆16Updated last year
- The purpose of this repo is to list all the related Research Papers focused on Smart-contracts security topics. As well as listing all th…☆41Updated 3 years ago
- Audit assist tool: Given a contract, find all subcontracts defined on it, calculate their sha-256 hash and look for exact matches☆39Updated last year
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 2 years ago
- Hacxyk Lab -- A sandboxed playground to exploit Ethereum contracts on a mainnet fork☆69Updated 2 years ago
- ☆121Updated 3 years ago
- ☆114Updated 2 years ago
- the magic X-ray machine for solidity smart contracts☆174Updated 2 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 2 years ago
- Price oracle manipulation attacks in defi☆49Updated 2 years ago
- My solutions to https://ctf.paradigm.xyz/☆62Updated last year
- ☆29Updated 3 years ago
- ERC20 contracts programmed only with low level syntax (inline assembly, pure Yul, ...)☆46Updated 2 years ago
- ☆35Updated 4 months ago
- ☆103Updated 2 years ago
- Quill CTF is a game in which you hack Ethereum smart contracts to learn about security. The game is designed to educate players on how t…☆58Updated last year
- My solutions to https://ethernaut.openzeppelin.com/☆68Updated 3 years ago
- Ethereum Smart Contract starting template☆110Updated last year
- Tool to compare smart contracts source code☆25Updated last year
- A checklist detailing DevSecOps practices for EVM-based projects.☆148Updated 2 years ago
- This is the official website for Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities☆57Updated 3 years ago
- A collection of smart contracts for implementing security controls and guardrails. Useful for OpSec and educational purposes.☆52Updated 2 years ago
- An Exploit on the AAVE v2 Contract Vulnerability☆28Updated 3 years ago
- ☆82Updated 2 years ago
- Classification of smart contract vulnerabilities☆82Updated 5 years ago
- ☆90Updated 3 years ago
- Chaotic good security research☆18Updated 5 months ago
- ☆54Updated 11 months ago
- ☆97Updated last year
- ☆23Updated 2 years ago