pcaversaccio / tornado-cash-exploitLinks
This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governance attack on Tornado Cash in May 2023.
☆59Updated last week
Alternatives and similar repositories for tornado-cash-exploit
Users that are interested in tornado-cash-exploit are comparing it to the libraries listed below
Sorting:
- Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)☆106Updated 2 years ago
- Writeup for solved challenges in Paradigm CTF 2022☆76Updated 3 years ago
- Identify flashloan bots in multiple chains☆34Updated 2 years ago
- Reveal unused code of a live smart contract by collecting coverage from historical transactions.☆73Updated last year
- DeFi exploits for educational purposes☆61Updated 2 years ago
- Examples for Branching Tree Technique, a simple specification framework for writing structured Solidity tests☆76Updated last year
- ☆20Updated 2 years ago
- ☆101Updated 2 years ago
- SushiSwap RouteProcessor2 exploit repro + supporting data useful for whitehats.☆91Updated 2 years ago
- ☆49Updated 2 years ago
- ☆115Updated 3 years ago
- ☆87Updated last month
- ☆46Updated 2 years ago
- Collection of past CTFs to play and practice locally.☆52Updated last year
- GasBad is an open-source project that evaluates gas efficiency in Solidity libraries☆70Updated last year
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- Solidity challenges for EthernautDAO☆43Updated 2 years ago
- CTF Writeups☆36Updated last year
- A Solidity code search tool with built-in static analysis detection☆78Updated last year
- ☆99Updated 2 years ago
- Console.log utility for debugging huff contracts☆68Updated last year
- ☆66Updated 2 years ago
- eBurger is a static analysis tool that provides a way to quickly query and analyze solidity smart contracts.☆38Updated 3 months ago
- Optimised Uniswap V2 contracts written in Huff language☆111Updated last year
- Web3 Security Toolbox☆73Updated last year
- Simple Rust script for finding colliding 4byte function selectors☆59Updated 2 years ago
- The good, the bad, and the ugly of proxy implementations☆104Updated last year
- ☆94Updated last year
- Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry☆77Updated 3 weeks ago
- ☆15Updated 2 years ago