lcatro / Ethereum_Similar_Contract_Classify
☆13Updated 5 years ago
Alternatives and similar repositories for Ethereum_Similar_Contract_Classify:
Users that are interested in Ethereum_Similar_Contract_Classify are comparing it to the libraries listed below
- Blockchain Challenges Collection(WIP)☆56Updated 2 years ago
- BlockChain Security☆27Updated 3 years ago
- ☆26Updated last week
- Extremely Fast Contract Defect Detectors☆13Updated last year
- The serial analysis of different types of security vulnerabilities found in blockchain projects(关于区块链智能合约安全漏洞类型连载分析)☆44Updated 6 years ago
- ☆39Updated 2 years ago
- Collect CTFs related to evm, and provide solutions, using Foundry. 收集 EVM 类的 CTF 挑战,并提供解决方案。☆155Updated 11 months ago
- 以太坊单合约交易调试工具☆16Updated 3 years ago
- ☆11Updated 2 years ago
- 区块链安全学习资料汇总☆27Updated 3 years ago
- ☆98Updated 2 years ago
- Vulnerabilities in some blockchain projects and there exploits☆47Updated last year
- Public audits☆51Updated last year
- RealWorld CTF 3rd billboard challenge & writeup☆27Updated 2 years ago
- ☆33Updated last week
- SolidCTF is an infrastructure solution that simplifies the build of Solidity CTF challenges.☆142Updated last year
- ☆79Updated 2 years ago
- some smart contract demos for audit lectures.☆7Updated 6 years ago
- 《区块链安全入门与实战》☆86Updated 4 years ago
- Analyze and reproduce attack events or vulnerabilities in the blockchain world.☆348Updated 3 years ago
- A curated list of awesome things related to Blockchain security☆77Updated 3 years ago
- Unofficial Dockerfile and scripts for building CodeQL databases for the OpenJDK☆48Updated last year
- ☆10Updated 4 years ago
- An all-in-one Ethereum SDK and command-line tool written in python.☆79Updated 6 months ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Updated 3 years ago
- A testing tool to assess the security of your Metamask wallet by reproducing real-world attack scenarios.☆17Updated last month
- 处于原型阶段☆20Updated 3 years ago
- JAVA指针分析☆13Updated 5 years ago
- shw's CTF challenges☆27Updated 4 years ago
- evil jar attack technical post-mortem☆141Updated 4 years ago