runtimeverification / kontrol
☆74Updated this week
Alternatives and similar repositories for kontrol
Users that are interested in kontrol are comparing it to the libraries listed below
Sorting:
- ☆90Updated 11 months ago
- A smart contract security search utility☆74Updated 4 months ago
- Tools for Yul.☆138Updated 2 years ago
- Using mutations to improve specs and test suites☆186Updated this week
- List of Halmos resources.☆54Updated 3 months ago
- A tool to automatically generate Foundry unit test cases from Echidna and Medusa failed properties☆106Updated 4 months ago
- Smart contract debugging data format – Standards development working group☆62Updated 2 weeks ago
- Symbolic execution engine written in Solidity, based on Difference Logic.☆111Updated 2 years ago
- A Symbolic Execution Tool for Cairo☆51Updated 2 years ago
- ☆38Updated 11 months ago
- Interactive formal verification tool for Yul programs☆64Updated last week
- Precise Attack Synthesis for DeFi Apps☆47Updated 2 years ago
- ☆108Updated this week
- ☆46Updated last year
- A general purpose unopinionated Solidity fuzzing library for stateful and stateless fuzzing☆35Updated 2 months ago
- Halmos vs Damn Vulnerable DeFi is the series of articles about solving the Damn Vulnerable DeFi CTF using the Halmos symbolic analyzer.☆33Updated 2 months ago
- easy POC template generation from the command line☆75Updated 8 months ago
- CLI tool to quickly generate init.json to seed Echidna straight from your Foundry project.☆14Updated 2 years ago
- ☆29Updated 2 weeks ago
- Content for Electisec Reports Site☆27Updated this week
- Simple Rust script for finding colliding 4byte function selectors☆59Updated last year
- Experimental tool to ease the review of smart contracts upgrades☆80Updated last year
- Index of Rareskill Blog posts using playwright☆21Updated last year
- This is the official website for Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities☆58Updated 4 years ago
- This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed…☆111Updated this week
- Playing with zero-knowledge proof languages☆105Updated 2 years ago
- Automated verification of uniqueness property for ZKP circuits☆76Updated last year
- ☆37Updated 10 months ago
- A 6-part series on how to use Echidna on real-world codebases☆107Updated last year
- An EVM bytecode disassembler/assembler☆47Updated 4 months ago