nvonpentz / solidity-exploitsLinks
Complete examples of solidity exploits
☆13Updated 8 years ago
Alternatives and similar repositories for solidity-exploits
Users that are interested in solidity-exploits are comparing it to the libraries listed below
Sorting:
- Example Manticore scripts☆68Updated last year
- Ethereum smart contract reverse engineering☆103Updated 7 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Vulnerable smart contracts☆69Updated 7 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- ☆71Updated 7 years ago
- my talk on defcon26☆20Updated 7 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- Tool for auditing Ethereum contracts☆55Updated 8 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆200Updated 5 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆151Updated 2 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆314Updated last year
- Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb☆260Updated 3 years ago
- A set of templates for different academic venues.☆29Updated 6 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- Attack-Defend CTF Tools☆23Updated 9 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- Writings on symbolic-execution-based security analysis of EVM smart contracts.☆174Updated 6 years ago
- Papers of smart contract security analysis (and tools)☆36Updated 6 years ago
- Dexaran's Naming Service☆20Updated 2 years ago
- BlockChain-Security-List☆105Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Weekly industry summary☆17Updated 7 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 7 years ago
- Repo for CSAW CTF 2018 Finals challenges☆55Updated 6 years ago
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago