nullity00 / zk-security-reviewsLinks
Collection of security reviews of ZK Protocols
☆237Updated last year
Alternatives and similar repositories for zk-security-reviews
Users that are interested in zk-security-reviews are comparing it to the libraries listed below
Sorting:
- Reproduce ZKP vulnerabilities☆307Updated last month
- Exercises to learn the syntax of Circom and create EVM compatible zero knowledge programs.☆332Updated 8 months ago
- Roadmap to get up to speed with CosmWasm smart contract audits and security vulnerabilities☆99Updated last year
- This repository contains Zk learning resources☆159Updated last year
- Hacks/Vulns/Audits Compilation☆162Updated last year
- A repository to house all the links, notes, photos, and random thoughts from previous D-squared YouTube recordings☆129Updated last year
- A curated list of awesome Starknet Security Resources. Tools, audits, CTFs and more.☆75Updated 8 months ago
- A set of exercises to practice Yul☆123Updated 3 months ago
- ☆227Updated 2 years ago
- zkPoEX enables white hat hackers to report live vulnerabilities in smart contracts while maintaining the confidentiality of the exploit, …☆236Updated 6 months ago
- My work for Rareskills ZK Book.☆72Updated last year
- This repository contains my Rareskills Solidity Bootcamp work.☆134Updated 2 years ago
- This repository contains list of resources to aid your journey of mastering Zero Knowledge Proofs. If you find any resource missing, you …☆264Updated 8 months ago
- MoonMath Manual notes, exercise solution and extra comments.☆30Updated last year
- Pre-built security properties for commonly forked DeFi protocols☆196Updated 2 years ago
- Smart Contract Property-Based Testing Framework☆139Updated 9 months ago
- My homework and notes on zkEVM Bootcamp by zkSync and Encode Club☆65Updated last year
- Collection of web3 resources for blockchain enthusiasts. Contains some major alpha on ZKP, Solidity & auditing.☆153Updated 2 years ago
- A 6-part series on how to use Echidna on real-world codebases☆111Updated 2 years ago
- A book for learning zero-knowledge applications and decentralized mixing by creating a simple mixer protocol based on Tornado Cash (WIP)☆284Updated 2 years ago
- Workshop about the different types of reentrancy attacks☆134Updated 9 months ago
- Public reports of audits performed by Nethermind Security☆57Updated 2 weeks ago
- A curated list of research, articles, tools, and resources focused on attacks against Fully Homomorphic Encryption (FHE)☆88Updated last month
- ☆113Updated last year
- CTF challenges made by MiloTruck☆97Updated 5 months ago
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆131Updated 2 years ago
- A curated collection of tools, frameworks, and methodologies for testing and verifying Solidity smart contracts.☆78Updated last year
- A community-maintained collection of bugs, vulnerabilities, and exploits in apps using ZK crypto.☆703Updated last year
- A list of public fuzzing campaigns☆127Updated 2 weeks ago
- ☆66Updated 11 months ago