iphelix / exploits-defi
Collection of PoCs and exploits for DeFi and other Ethereum projects
☆78Updated 2 years ago
Alternatives and similar repositories for exploits-defi:
Users that are interested in exploits-defi are comparing it to the libraries listed below
- Writeup for solved challenges in Paradigm CTF 2022☆76Updated 2 years ago
- DeFi exploits for educational purposes☆59Updated last year
- This is the official website for Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities☆58Updated 4 years ago
- This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governanc…☆52Updated last week
- ☆21Updated 2 years ago
- ☆15Updated 2 years ago
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- ☆39Updated last year
- ☆96Updated 2 years ago
- Vyper Based Capture The Flag Challenges☆35Updated 2 years ago
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 3 years ago
- ☆99Updated 2 years ago
- Minimal bytecode peephole optimizer☆127Updated 3 months ago
- My solutions to https://ctf.paradigm.xyz/☆62Updated 2 years ago
- ☆19Updated 2 years ago
- Graveyard of past Web3 exploits☆21Updated 2 years ago
- ☆115Updated 3 years ago
- ☆102Updated 2 years ago
- ☆49Updated 2 years ago
- ☆46Updated last year
- Mixing service using the Nym network to anonymize Ethereum RPC calls☆56Updated 2 years ago
- A collection of my security audits☆53Updated 2 months ago
- ☆40Updated 2 years ago
- A BugBounty companion that checks out high-reward yielding bug bounty code-bases from Immunefi/code4rena 🙌 (use at own risk)☆70Updated last year
- CTF-like challenges of smart contracts☆63Updated 2 years ago
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆103Updated last year
- Barebones Solidity smart contract fuzzer☆94Updated 2 years ago
- Formally verifying consistency between Solmate and Solady using Halmos☆54Updated 8 months ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆52Updated last year
- ☆122Updated 3 years ago