rkm0959 / PresentationsLinks
Presentations by rkm0959
☆26Updated last year
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Some of Our Audit Reports, Presentations, etc☆13Updated last year
- ☆25Updated last year
- Framework for Solana CTF challenges☆67Updated 3 months ago
- 🧩 Collection of CTF challenges written by me☆19Updated 5 months ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆13Updated last year
- PoC Exploit of a soundness bug exploit in the zkSync Era ZK-circuits☆37Updated 6 months ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆67Updated 2 years ago
- Automated verification of uniqueness property for ZKP circuits☆42Updated last year
- ☆31Updated 5 months ago
- A curated list of awesome security resources for ZK.☆89Updated last week
- Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines☆11Updated 2 years ago
- Public infra related to hosting Paradigm CTF☆113Updated last year
- A Rust macro for quickly unwrapping a refutable pattern.☆11Updated last year
- SMT 2023 Submission; license pending☆56Updated 9 months ago
- A curated list of research, articles, tools, and resources focused on attacks against Fully Homomorphic Encryption (FHE)☆83Updated 2 months ago
- Automated verification of uniqueness property for ZKP circuits☆87Updated last year
- Zero Knowledge based Ethereum Virtual Machine in Circom language☆17Updated 2 months ago
- ☆38Updated 11 months ago
- ☆11Updated last year
- ☆48Updated last year
- A symbolic execution engine for EVM smart contract binaries.☆114Updated last week
- Smart Contract Fuzzing Towards Profitable Vulnerabilities☆51Updated last month
- shw's CTF challenges☆27Updated 4 years ago
- ☆80Updated last year
- ethpwn - the Swiss Army Knife for Smart Contract Hacking☆51Updated 9 months ago
- Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses (ASE '21)☆152Updated 3 weeks ago
- My swiss army knife for reversing EVM bytecodes (super experimental)☆120Updated last week
- Ecne: An engine for verifying the soundness of R1CS constraints☆111Updated 3 years ago
- ☆17Updated 10 months ago
- Cuda implementation of EVM bytecode executor☆112Updated 8 months ago