nvonpentz / solidity-exploitsLinks
Complete examples of solidity exploits
☆13Updated 7 years ago
Alternatives and similar repositories for solidity-exploits
Users that are interested in solidity-exploits are comparing it to the libraries listed below
Sorting:
- Example Manticore scripts☆68Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Ethereum smart contract reverse engineering☆102Updated 6 years ago
- Vulnerable smart contracts☆69Updated 7 years ago
- Tool for auditing Ethereum contracts☆55Updated 7 years ago
- Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb☆260Updated 2 years ago
- ☆70Updated 7 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Safely explore a known honeypot contract using a forked network☆19Updated 2 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆152Updated 2 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10Updated 7 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Weekly industry summary☆17Updated 7 years ago
- The Decentralized Application Security Project☆237Updated 4 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- finals-2014☆20Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 11 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Updated 7 years ago
- my talk on defcon26☆20Updated 6 years ago
- 😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)☆201Updated 5 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Writings on symbolic-execution-based security analysis of EVM smart contracts.☆171Updated 6 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆314Updated last year
- Ethereum Bug Bounty Submission: Sending Negative Value Transactions☆18Updated 3 years ago
- Framework for cryptoeconomic contract security, decentralized security bounties. Live on Ethereum.☆74Updated 7 years ago