nvnx7 / ethernaut-openzeppelin-hacksView external linksLinks
Hacks to Openzeppelin's Ethernaut smart contract challenges
☆84Sep 18, 2023Updated 2 years ago
Alternatives and similar repositories for ethernaut-openzeppelin-hacks
Users that are interested in ethernaut-openzeppelin-hacks are comparing it to the libraries listed below
Sorting:
- ☆105Oct 24, 2022Updated 3 years ago
- ☆16Dec 10, 2023Updated 2 years ago
- Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff☆25Feb 20, 2023Updated 2 years ago
- A quick and easy way to test gas optimizations.☆27Jul 4, 2022Updated 3 years ago
- ☆11Mar 8, 2023Updated 2 years ago
- ☆12Nov 29, 2023Updated 2 years ago
- Fuzzing solmate with medusa☆10Aug 14, 2023Updated 2 years ago
- ☆87Sep 6, 2022Updated 3 years ago
- public audit & bug reports☆278Oct 7, 2024Updated last year
- ☆22Apr 12, 2023Updated 2 years ago
- ☆15Jan 24, 2023Updated 3 years ago
- Final audit reports for Beanstalk ecosystem code.☆13Sep 13, 2024Updated last year
- Based Ethereum framework for writing tests in Rust☆12Dec 17, 2023Updated 2 years ago
- ☆12Sep 27, 2023Updated 2 years ago
- testing https://github.com/radicle-dev/radicle-contracts☆14Feb 18, 2021Updated 4 years ago
- The Bridgoooooooor☆25Jan 12, 2025Updated last year
- A comprehensive collection of clustered smart contract vulnerabilities discovered through security audits, organized by severity and freq…☆38Aug 31, 2025Updated 5 months ago
- Audit reports and engineering specifications for M^0 protocol and TTG governance☆13Mar 19, 2025Updated 10 months ago
- ☆55Apr 4, 2025Updated 10 months ago
- ☆29Jul 1, 2024Updated last year
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆31Jan 18, 2025Updated last year
- ☆14Jul 10, 2024Updated last year
- ☆13Dec 11, 2023Updated 2 years ago
- Practical tutorials of Certora Prover☆241Sep 27, 2023Updated 2 years ago
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Jul 29, 2023Updated 2 years ago
- An NFT with Huff, using polynomials over a finite field with order largest prime address, instead of mappings.☆16Sep 19, 2024Updated last year
- ☆14Dec 15, 2023Updated 2 years ago
- A chronological and (hopefully) complete list of reentrancy attacks to date.☆1,582Nov 24, 2025Updated 2 months ago
- Learn smart contract security by hacking popular smart contract systems.☆97Jul 15, 2018Updated 7 years ago
- A portfolio repository for Egis Security's past audits☆62Nov 7, 2025Updated 3 months ago
- List of resources to learn smart contract hacking.☆242May 22, 2019Updated 6 years ago
- ☆18Jan 8, 2023Updated 3 years ago
- ☆17Feb 22, 2024Updated last year
- Testing echidna vs. forge fuzzing☆77Dec 20, 2022Updated 3 years ago
- Heuristics for smart contract auditors☆610Dec 13, 2022Updated 3 years ago
- ☆23Jul 1, 2023Updated 2 years ago
- ☆226Aug 22, 2023Updated 2 years ago
- ☆66Feb 2, 2023Updated 3 years ago
- ☆34Jul 9, 2022Updated 3 years ago