nvonpentz / solidity-exploitsLinks
Complete examples of solidity exploits
☆13Updated 7 years ago
Alternatives and similar repositories for solidity-exploits
Users that are interested in solidity-exploits are comparing it to the libraries listed below
Sorting:
- Example Manticore scripts☆68Updated last year
- Vulnerable smart contracts☆69Updated 7 years ago
- Ethereum smart contract reverse engineering☆103Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Tool for auditing Ethereum contracts☆55Updated 8 years ago
- my talk on defcon26☆20Updated 7 years ago
- The Decentralized Application Security Project☆238Updated 4 years ago
- ☆71Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Weekly industry summary☆17Updated 7 years ago
- Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb☆261Updated 3 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆314Updated last year
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- ☆14Updated 7 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Updated 7 years ago
- ☆123Updated 4 years ago
- Writings on symbolic-execution-based security analysis of EVM smart contracts.☆173Updated 6 years ago
- Misuse cases of Cryptography in real world software products☆12Updated 6 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆46Updated 7 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Framework for cryptoeconomic contract security, decentralized security bounties. Live on Ethereum.☆74Updated 7 years ago
- A Blockchain And Smart Contract Based CTF☆16Updated 2 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Updated 8 years ago
- poststructural fuzzing☆31Updated 5 years ago
- Attack-Defend CTF Tools☆23Updated 8 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- ☆22Updated 8 years ago