romanrakhlin / Permit-Phishing
The demonstration of a fake EIP2612 signature for stealing ERC20 tokens with Permit2
☆52Updated 2 years ago
Alternatives and similar repositories for Permit-Phishing:
Users that are interested in Permit-Phishing are comparing it to the libraries listed below
- Centralized Repo where all the tutorials of UV_Labs are maintained.☆69Updated 2 years ago
- 🦄 🦄 🦄 🦄 Core smart contracts of Uniswap v4☆56Updated 11 months ago
- 一个不断迭代更新的套利机器人的实现☆38Updated 2 years ago
- WTF Solidity gas optimization techniques, verified with Foundry.☆208Updated 3 weeks ago
- ☆32Updated 2 years ago
- ☆15Updated last year
- Various DeFi scripts and examples☆50Updated 2 months ago
- call smart contract method without abi file☆40Updated 3 years ago
- Cross-chain deployed Smart-contract to detect Honeypot and Slippage for DeFi tokens.☆131Updated 10 months ago
- blogs about uniswap and other defi projects☆77Updated last week
- 👾 notes and resources on decentralized protocols (e.g. oracles, bridges, honeypots, cryptography, decompilers, static analysis, bug boun…☆260Updated last month
- A phishing website to demonstrate how a hacker can steal your ERC-20 tokens with the approve and transferFrom functions, and the risk of …☆42Updated 3 years ago
- Uniswap Universal Router SDK - Decode and Encode Transactions☆210Updated last week
- This is a simple MEV bot written in go to demonstrate how to use flashbots v0.2 with the Goerli testnet.☆64Updated 3 years ago
- A trading bot for friend.tech☆56Updated last year
- On-chain test DeFi using Foundry☆195Updated last year
- Tornado Cash Classic UI☆85Updated 2 years ago
- Efficiently transfer ether or tokens to many addresses in batch, powered by Huff.☆84Updated 7 months ago
- ☆89Updated 5 months ago
- collected bsc contract source code☆26Updated last year
- Flashbots bundle to recover $44k worth of unclaimed Gelato ICO tokens from a compromised wallet☆48Updated last year
- Comparison of flash loan solutions on Ethereum☆271Updated 2 years ago
- 🥪 Snipe new tokens bought by the most powerful MEV bots (Sandwitch, Arbitrage, Snipping) in Go on EVM networks.☆45Updated last year
- 闪电贷课程教学☆168Updated 2 years ago
- save airdrop in hacked wallet example☆284Updated 10 months ago
- ☆103Updated 2 years ago
- The project aims to identify crypto honeypots in many chains.☆67Updated last year
- ☆36Updated 2 years ago
- ☆46Updated 4 years ago
- Opinionated security and code quality standard for Solidity smart contracts.☆40Updated 2 years ago