nvonpentz / solidity-exploitsLinks
Complete examples of solidity exploits
☆13Updated 8 years ago
Alternatives and similar repositories for solidity-exploits
Users that are interested in solidity-exploits are comparing it to the libraries listed below
Sorting:
- Example Manticore scripts☆68Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- ☆71Updated 7 years ago
- Ethereum smart contract reverse engineering☆104Updated 7 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- Vulnerable smart contracts☆70Updated 7 years ago
- Tool for auditing Ethereum contracts☆56Updated 8 years ago
- Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb☆260Updated 3 years ago
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- my talk on defcon26☆20Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆201Updated 5 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆316Updated last year
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- This is Ethereum devp2p protocol dissector plugin for wireshark.☆49Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10Updated 7 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- ☆123Updated 4 years ago
- Weekly industry summary☆17Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- Misuse cases of Cryptography in real world software products☆12Updated 7 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 7 years ago
- BlockChain-Security-List☆105Updated 7 years ago