felix0888 / fallback-attack
Smart Contract Security Practice | Lv1 Fallback Attack
☆16Updated 3 years ago
Alternatives and similar repositories for fallback-attack:
Users that are interested in fallback-attack are comparing it to the libraries listed below
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 3 years ago
- ☆21Updated 2 years ago
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- ☆15Updated 2 years ago
- Ethernaut, but in Huff☆28Updated 2 years ago
- ☆13Updated last year
- ⛳ Template for Forge + EVM Toolkit☆55Updated 2 years ago
- This is the official website for Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities☆58Updated 3 years ago
- Go-to compilation of smart contract proxy information, for discerning devs and auditors☆23Updated 3 weeks ago
- unhacked challenge 1: reaper☆41Updated 2 years ago
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆29Updated 3 months ago
- Foundry + Yul puzzles☆33Updated last year
- ☆37Updated 2 years ago
- Simple Rust script for finding colliding 4byte function selectors☆59Updated last year
- A reentrancy attack on the Deadfrenz Lab Pass contract☆19Updated 3 years ago
- ☆49Updated last year
- Vyper Based Capture The Flag Challenges☆35Updated 2 years ago
- ☆42Updated 6 months ago
- ☆37Updated 9 months ago
- https://twitter.com/jtriley_eth/status/1550459124047138819?s=20&t=cTBP-TSnIstNEwwPuRDF5Q☆17Updated 2 years ago
- Publicly available audits and bug reports☆16Updated 2 weeks ago
- ☆63Updated last year
- Graveyard of past Web3 exploits☆21Updated 2 years ago
- ☆18Updated 2 years ago
- Code for the tutorial on how to poc bug leads on Immunefi using foundry☆13Updated 2 years ago
- ☆29Updated 2 years ago
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Har…☆34Updated 2 years ago
- Audit assist tool: Given a contract, find all subcontracts defined on it, calculate their sha-256 hash and look for exact matches☆39Updated 2 years ago
- Example code for testing using Echidna explained during the Spearbit presentation☆40Updated 2 years ago