dmuhs / teatime
An RPC attack framework for Blockchain nodes.
☆95Updated last year
Alternatives and similar repositories for teatime
Users that are interested in teatime are comparing it to the libraries listed below
Sorting:
- Ethereum/EVM Node Security Toolkit☆70Updated 10 months ago
- ☆90Updated 10 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆32Updated 9 months ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated 2 years ago
- A command line interface for the MythX smart contract security analysis API☆91Updated last year
- A checklist of things to look for when auditing Solidity smart contracts.☆73Updated 7 years ago
- Blockchain Challs from HACON2020 CTF☆13Updated 3 years ago
- CLI client for the MythX API☆20Updated 2 years ago
- Disclosure reports by PepperSec☆20Updated 4 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 6 years ago
- Security analyzer for Solidity smart contracts. Uses the MythX smart contract security service.☆59Updated 4 years ago
- List of CTF related to Ethereum world (solidity smart contracts)☆120Updated 3 years ago
- Bricks is a sandbox and instruction manual collection for building smart contract exploits for Ethereum blockchains, designed to help dev…☆26Updated 4 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 4 years ago
- ☆111Updated 2 years ago
- A test suite to check for client-side script injection on websites that display NFTs.☆51Updated 2 years ago
- Smart Contract Security Testing Guide (SCSTG)☆17Updated last year
- Scripts used in Blockchain Exploitation Blog☆41Updated last year
- A Blockchain And Smart Contract Based CTF☆16Updated last year
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆52Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆100Updated 6 years ago
- A framework for assessing the security of L2s☆47Updated last year
- Solidity Contract Function Profiler☆82Updated 6 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆140Updated 3 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- A Purposefully Vulnerable Blockchain☆51Updated 4 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆24Updated 4 years ago
- My key take-aways from reviewing vulnerable Solidity smart contracts☆9Updated 2 years ago