mingjingc / abi-decoder
☆13Updated 4 months ago
Alternatives and similar repositories for abi-decoder:
Users that are interested in abi-decoder are comparing it to the libraries listed below
- Go bindings for Ethereum smart contracts: ERC20, ERC165 and ERC721, ERC777, ERC1155☆95Updated 2 years ago
- Make many view calls in single `eth_call`☆16Updated 8 months ago
- A simple Ethereum wallet implementation and utilities in Golang☆33Updated last year
- ☆46Updated 3 years ago
- ☆36Updated 5 months ago
- already abigen code for main defi projects☆64Updated 3 years ago
- A devp2p crawler targeted at Eth2 nodes☆59Updated last year
- A Go implementation of EIP-4361 Sign In With Ethereum verification☆64Updated 3 weeks ago
- ☆39Updated this week
- Bridge for op-stack chains using WAGMI☆32Updated 3 weeks ago
- Smart wallet implementation, using ERC-4337☆88Updated 2 years ago
- Subgraph for the Cryptopunks marketplace☆59Updated 10 months ago
- Bundler specification test suites☆78Updated this week
- Signature verification of Ethereum. It supports standard elliptic curve, eip712, erc1271 and some hardware wallets such as ledger.☆66Updated 2 years ago
- Dependencies of Erigon project, rewritten from scratch and licensed under Apache 2.0☆59Updated last year
- EVM code☆32Updated 2 years ago
- Build UniswapV2 with Solidity 0.8+ and hardhat stack☆34Updated 10 months ago
- Interfaces for Erigon components☆101Updated this week
- Optimism implementation on the efficiency frontier☆89Updated this week
- ☆87Updated 4 years ago
- Generate Ethereum smart contract storage layout with Hardhat.☆65Updated last year
- ☆116Updated this week
- Solve the fully decentralized cross-chain between any chain.☆36Updated 2 years ago
- Golang client for compound.finace api and smart contracts☆23Updated last year
- Ethereum transaction signer using AWS KMS keys. An extension for the go ethereum client library.☆58Updated this week
- ☆65Updated this week
- ☆47Updated 2 weeks ago
- Fastest☆81Updated 2 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 2 weeks ago
- ☆54Updated last year