orenyomtov / code-is-law-2Links
Solidity CTF challenge from BSides TLV 2022
☆14Updated 3 years ago
Alternatives and similar repositories for code-is-law-2
Users that are interested in code-is-law-2 are comparing it to the libraries listed below
Sorting:
- Helper functions enabling players to solve past curta puzzles on their own time.☆32Updated 2 years ago
- Ethernaut, but in Huff☆28Updated 2 years ago
- unhacked challenge 1: reaper☆42Updated 3 years ago
- Go-to compilation of smart contract proxy information, for discerning devs and auditors☆23Updated 9 months ago
- ☆37Updated last year
- ☆17Updated 4 months ago
- Example of the whitehack for Curve exploit 30/07/23☆19Updated 2 years ago
- Formally verifying consistency between Solmate and Solady using Halmos☆55Updated last year
- Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff☆25Updated 2 years ago
- ☆88Updated 4 months ago
- A regex virtual machine for full featured pattern matching on Ethereum Virtual Machine.☆20Updated last year
- Vyper Based Capture The Flag Challenges☆35Updated 3 years ago
- ☆63Updated 2 years ago
- Fast paced learning group for ZK enthusiasts focused on circuit development & Security☆35Updated 2 years ago
- Reproduction of the $41M Curve reentrancy hacks on July 30 2023 using on-chain fuzzing with Echidna☆28Updated last year
- Eclectic notes on static analysis and compilers☆47Updated 3 years ago
- Collection of past CTFs to play and practice locally.☆52Updated last year
- MEV Olympics☆44Updated last year
- Novel and informative web3 security talks☆20Updated 3 years ago
- Solidity By Example rewritten in Huff, the most based low-level EVM language.☆34Updated last year
- ☆19Updated 2 years ago
- Example code for testing using Echidna explained during the Spearbit presentation☆40Updated 3 years ago
- ☆47Updated 2 years ago
- Identify flashloan bots in multiple chains☆34Updated 3 years ago
- ☆19Updated 3 years ago
- Foundry + Yul puzzles☆33Updated 2 years ago
- Mutation testing tool for circom☆17Updated 2 years ago
- A curated list of security related material for the growing starknet ecosystem particularly cairo smart contracts.☆14Updated 3 years ago
- ☆16Updated last year
- Saltzer and Schroeder's 10 secure design principles as applied to solidity smart contracts.☆55Updated 3 years ago