iphelix / euler-exploit-poc
☆48Updated last year
Alternatives and similar repositories for euler-exploit-poc:
Users that are interested in euler-exploit-poc are comparing it to the libraries listed below
- ☆35Updated last year
- Series of CTF challenges based off real world smart contract vulnerabilities.☆26Updated 10 months ago
- Formally verifying consistency between Solmate and Solady using Halmos☆53Updated 5 months ago
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆29Updated last month
- Content for Electisec Reports Site☆27Updated this week
- Diagrams for Solidity contracts☆45Updated 11 months ago
- Index of Rareskill Blog posts using playwright☆21Updated 11 months ago
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- Smart contract exploit proof of concept exploit standard interface☆16Updated last year
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆28Updated 11 months ago
- CTF challenges made by MiloTruck☆67Updated 5 months ago
- Collection of past CTFs to play and practice locally.☆51Updated 6 months ago
- APG (Auditor Profile Generator)☆35Updated last year
- Optimised Uniswap V2 contracts written in Huff language☆111Updated 9 months ago
- Foundry + Yul puzzles☆32Updated last year
- ☆54Updated last year
- ☆36Updated 7 months ago
- ☆18Updated this week
- ☆42Updated 4 months ago
- Simple Rust script for finding colliding 4byte function selectors☆57Updated last year
- unhacked challenge 1: reaper☆41Updated 2 years ago
- CLI tool to quickly generate init.json to seed Echidna straight from your Foundry project.☆14Updated 2 years ago
- A static analyzer for Solidity, built upon regex and ASTs.☆25Updated last year
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆48Updated last week
- Public profile of my adventure as a blockchain and smart contract security auditor.☆67Updated last week
- A mostly mostly reasonable approach to inline Yul styling.☆30Updated 10 months ago
- ☆47Updated last month
- Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff☆25Updated 2 years ago
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆29Updated last year
- PoC of KyberSwap double liquidity add exploit☆41Updated last year