The sec3 audit reports and publications
☆11Feb 2, 2026Updated last month
Alternatives and similar repositories for reports
Users that are interested in reports are comparing it to the libraries listed below
Sorting:
- ☆24Nov 17, 2025Updated 3 months ago
- Some of Our Audit Reports, Presentations, etc☆13Mar 26, 2024Updated last year
- ☆17Aug 31, 2023Updated 2 years ago
- This repository contains public security audit reports conducted by CyStack☆17Dec 14, 2024Updated last year
- Smart contract auditing portfolio☆36Aug 7, 2025Updated 6 months ago
- ☆50Feb 24, 2026Updated last week
- ☆24Updated this week
- ☆24May 16, 2023Updated 2 years ago
- Disclosure reports by PepperSec☆20May 20, 2020Updated 5 years ago
- ☆25Feb 24, 2026Updated last week
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Feb 23, 2023Updated 3 years ago
- This repository provides the code and guidance for reproducing the results in our ESEC/FSE 2023 submission "Pre-training Code Representat…☆27Jan 24, 2024Updated 2 years ago
- Presentations by rkm0959☆27Apr 11, 2024Updated last year
- ☆42Nov 2, 2025Updated 4 months ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Jan 4, 2020Updated 6 years ago
- List of public audit reports☆59Jan 31, 2026Updated last month
- CTF Writeups☆36Nov 26, 2023Updated 2 years ago
- Web3 Security For The Few Who Demand Perfection☆283Feb 17, 2026Updated 2 weeks ago
- A Solidity code search tool with built-in static analysis detection☆74Jul 20, 2024Updated last year
- ☆37Nov 16, 2023Updated 2 years ago
- Expelee offers comprehensive code reviews for teams that are preparing to launch their blockchain applications. We scan for security vuln…☆10Jan 25, 2026Updated last month
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Every time a Bug Bounty Program in Immunefi modifies its policy, assets-in-scope, or bounties-table, a bot will commit those changes to t…☆69Updated this week
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- ☆34Apr 17, 2021Updated 4 years ago
- ☆88Sep 3, 2025Updated 6 months ago
- MCP for reverse engineering☆47Mar 30, 2025Updated 11 months ago
- 在AI IDE中完成鸿蒙HarmonyOS应用与元服务的开发,编译构建及测试☆26Updated this week
- SC Audit Studio, also known as Smart Contract Audit Studio, is a powerful tool that serves as an all-in-one Integrated Development Enviro…☆11May 30, 2023Updated 2 years ago
- PoC Exploit of a soundness bug exploit in the zkSync Era ZK-circuits☆39Feb 23, 2025Updated last year
- HnuSec 海南大学网安实验室☆13Jan 30, 2024Updated 2 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- Security Audit reports by Decurity☆44Jan 13, 2026Updated last month
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆19Feb 24, 2026Updated last week
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- Public security reports☆16Dec 6, 2024Updated last year
- Taint analysis implementation based on Heros and Soot☆45May 6, 2024Updated last year
- List of the public smart contract audit reports and security reviews performed by Hexens.☆55Feb 17, 2026Updated 2 weeks ago