Vulnerabilities in some blockchain projects and there exploits
☆48May 13, 2023Updated 3 years ago
Alternatives and similar repositories for chain-exploit
Users that are interested in chain-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22May 18, 2022Updated 4 years ago
- Analyze and reproduce attack events or vulnerabilities in the blockchain world.☆353Apr 23, 2022Updated 4 years ago
- go example to use mev geth☆18Apr 22, 2021Updated 5 years ago
- A minimalistic contract to execute a payload and make the code size of the msg.sender appear to be 0.☆139Apr 18, 2022Updated 4 years ago
- Analysis of DeFi hack incidents.☆24Oct 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆24Apr 16, 2022Updated 4 years ago
- A curated list of major DeFi hacks along with their POCs in foundry☆82Feb 8, 2024Updated 2 years ago
- ☆11May 10, 2022Updated 4 years ago
- A simple REACT component for generating posters☆10Mar 2, 2022Updated 4 years ago
- 解决IDA Pro 7.0版本在遇到使用CET技术的ELF文件时符号解析错误的问题☆18Oct 23, 2020Updated 5 years ago
- Ethereum transaction decoder (community version).☆14Aug 27, 2021Updated 4 years ago
- Zicx's Notebook.☆10Nov 7, 2025Updated 6 months ago
- Damn Vulnerable DeFi - Foundry Version☆511Feb 6, 2024Updated 2 years ago
- 🦠🔬 Forta bot that detects deployment of smart contracts containing exploits☆52Jun 5, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.