Index of the most common vulnerabilities per protocol type, with 460 vulnerabilities across 31 protocol types
☆159Feb 20, 2026Updated 2 months ago
Alternatives and similar repositories for protocol-vulnerabilities-index
Users that are interested in protocol-vulnerabilities-index are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Claude Code skill that scans Solidity codebases for security vulnerabilities by referencing 36 unique vulnerability types☆98Mar 11, 2026Updated last month
- The Inescapable Auditor -- iterative deep-logic security audit agent for Claude Code☆219Mar 16, 2026Updated last month
- An AI security awesome list / learning journey☆102Mar 13, 2026Updated last month
- DApp that let's you buy me a coffee with crypto ☕️☆13Oct 24, 2022Updated 3 years ago
- Autonomous Web3 security audit agent for Claude Code☆220Apr 9, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Primers for Specialist AI Smart Contract Auditors☆264Dec 16, 2025Updated 4 months ago
- Improved Barebones Solidity smart contract fuzzer☆11Apr 12, 2023Updated 3 years ago
- General purpose unopinionated Solidity fuzzing library for stateful and stateless fuzzing☆60Jan 18, 2026Updated 3 months ago
- Formally verified smart contracts gives mathematical certainty across all inputs and execution paths. We bet that agents will make full f…☆69Updated this week
- This repository comprises of everything you need to know about Solidity proxies, upgradeable smart contracts and their security.☆19Jun 3, 2024Updated last year
- A cognitive playbook for experienced smart contract auditors. Structures audit thinking, exploration, validation, and reporting. Not an a…☆41Jan 23, 2026Updated 3 months ago
- Smart contract exploit proof of concept exploit standard interface☆16Aug 9, 2023Updated 2 years ago
- Resources to stay up to date with Move language security.☆68Jan 8, 2026Updated 3 months ago
- Move Vulnerability Database☆87Feb 4, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- MCP server for searching Solodit smart contract security findings☆141Apr 23, 2026Updated last week
- ☆53Oct 27, 2025Updated 6 months ago
- Database of public audits made by ABDK Consulting☆112Jan 24, 2026Updated 3 months ago
- AI Agent Skills for Smart Contract Auditing to generate triaged, industry grade report findings, code locations, pocs, attacker story flo…☆96Apr 21, 2026Updated last week
- Move Vulnerability Database☆19Nov 18, 2025Updated 5 months ago
- ☆38Feb 11, 2022Updated 4 years ago
- A collection of smart contract vulnerabilities along with prevention methods☆2,452Feb 8, 2026Updated 2 months ago
- Solidity CTF challenges for mrstealyocrypto.xyz (foundry)☆143Dec 11, 2023Updated 2 years ago
- Audit reports by auditors under Cairo Security Clan☆18Feb 21, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆88Sep 3, 2025Updated 7 months ago
- ☆22Oct 18, 2025Updated 6 months ago
- Based Ethereum framework for writing tests in Rust☆12Dec 17, 2023Updated 2 years ago
- Permissionless pooling of NFT's into an ERC20.☆14Dec 22, 2022Updated 3 years ago
- A Library for processing ERC20 payments & stablecoin payments inside smart contract.☆10Sep 12, 2021Updated 4 years ago
- ☆13Jul 21, 2022Updated 3 years ago
- Reproduce ZKP vulnerabilities☆330Updated this week
- PoC of KyberSwap double liquidity add exploit☆42Aug 30, 2023Updated 2 years ago
- ☆233Apr 24, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An evolving set of solana ctf challenges and vulnerabilties☆15Jun 4, 2025Updated 10 months ago
- Rust implementation of the EVM☆14Mar 19, 2023Updated 3 years ago
- Web3 Security For The Few Who Demand Perfection☆294Apr 22, 2026Updated last week
- ☆22Oct 19, 2025Updated 6 months ago
- Demo of knowledge graph creation and Graph RAG with Dspy and Kuzu☆22Jun 30, 2025Updated 10 months ago
- easy POC template generation from the command line☆78Aug 30, 2024Updated last year
- ☆10Jun 17, 2025Updated 10 months ago