orenyomtov / code-is-law-2Links
Solidity CTF challenge from BSides TLV 2022
☆14Updated 2 years ago
Alternatives and similar repositories for code-is-law-2
Users that are interested in code-is-law-2 are comparing it to the libraries listed below
Sorting:
- Secp256k1 Elliptic Curve Library Written In Huff☆5Updated last year
- Repositery to show case the recent thirdweb exploit that raised due to using openzeppelin ERC2771 implementation with a multi call.☆17Updated last year
- A regex virtual machine for full featured pattern matching on Ethereum Virtual Machine.☆20Updated 5 months ago
- ☆29Updated 2 years ago
- Ethernaut, but in Huff☆28Updated 2 years ago
- Helper functions enabling players to solve past curta puzzles on their own time.☆31Updated last year
- Example of the whitehack for Curve exploit 30/07/23☆19Updated last year
- ☆21Updated 3 years ago
- Go-to compilation of smart contract proxy information, for discerning devs and auditors☆23Updated 2 months ago
- Publicly available audits and bug reports☆16Updated 3 weeks ago
- ☆17Updated 3 months ago
- unhacked challenge 1: reaper☆41Updated 2 years ago
- Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff☆25Updated 2 years ago
- A collection of practical security-focused guides and checklists for Morpho smart contract development.☆26Updated 2 years ago
- Tstore huff template☆17Updated last year
- MEV Olympics☆44Updated 6 months ago
- ☆22Updated 2 years ago
- A barebones framework for hand tuned smart contracts in pure opcodes.☆47Updated 2 years ago
- ☆16Updated 9 months ago
- Foundry + Yul puzzles☆33Updated last year
- ☆12Updated 2 years ago
- Example code for testing using Echidna explained during the Spearbit presentation☆40Updated 2 years ago
- Vyper Based Capture The Flag Challenges☆35Updated 2 years ago
- ☆14Updated last week
- An efficient constant gas function dispatch pattern for solidity external libraries.☆15Updated last year
- https://twitter.com/jtriley_eth/status/1550459124047138819?s=20&t=cTBP-TSnIstNEwwPuRDF5Q☆17Updated 2 years ago
- ☆63Updated 2 years ago
- Smart Contract Security Practice | Lv1 Fallback Attack☆16Updated 3 years ago
- Formally verifying consistency between Solmate and Solady using Halmos☆54Updated 9 months ago
- ☆24Updated 2 years ago