rkm0959 / PresentationsLinks
Presentations by rkm0959
☆26Updated last year
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Some of Our Audit Reports, Presentations, etc☆13Updated last year
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆68Updated 2 years ago
- Automated verification of uniqueness property for ZKP circuits☆42Updated last year
- ☆47Updated last year
- ☆30Updated 4 months ago
- SMT 2023 Submission; license pending☆56Updated 7 months ago
- PoC Exploit of a soundness bug exploit in the zkSync Era ZK-circuits☆38Updated 4 months ago
- ☆24Updated 11 months ago
- Automated verification of uniqueness property for ZKP circuits☆77Updated last year
- Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines☆11Updated 2 years ago
- Write-ups submitted by CTF participants☆35Updated 2 years ago
- Framework for Solana CTF challenges☆64Updated last month
- Ecne: An engine for verifying the soundness of R1CS constraints☆109Updated 2 years ago
- A Rust macro for quickly unwrapping a refutable pattern.☆11Updated last year
- Formal verification of WETH9.sol with Z3☆58Updated 2 years ago
- For practice to using halo2☆22Updated 2 years ago
- A curated list of awesome security resources for ZK.☆87Updated last week
- ☆11Updated last year
- Implementation of zero knowledge proof protocol - Groth16, Plonk. For education purposes. Not a production ready code.☆78Updated last year
- A Symbolic Execution Tool for Cairo☆51Updated 2 years ago
- ☆17Updated 9 months ago
- 🧩 Collection of CTF challenges written by me☆19Updated 3 months ago
- ethpwn - the Swiss Army Knife for Smart Contract Hacking☆50Updated 8 months ago
- Public infra related to hosting Paradigm CTF☆112Updated last year
- ☆88Updated 4 months ago
- ☆11Updated 2 years ago
- Smart Contract Fuzzing Towards Profitable Vulnerabilities☆42Updated last week
- An EVM bytecode disassembler/assembler☆51Updated 6 months ago
- ☆78Updated last year
- A curated list of research, articles, tools, and resources focused on attacks against Fully Homomorphic Encryption (FHE)☆79Updated last month