secureum / DeFi-Security-Summit-StanfordLinks
DEFI Focus Smart Contract Security Capture the Flag
☆178Updated 2 years ago
Alternatives and similar repositories for DeFi-Security-Summit-Stanford
Users that are interested in DeFi-Security-Summit-Stanford are comparing it to the libraries listed below
Sorting:
- Template repository intended to ease fuzzing components of Solidity projects, especially libraries.☆208Updated last year
- Pre-built security properties for commonly forked DeFi protocols☆196Updated last year
- ☆87Updated 2 years ago
- A collection of common security issues and possible gas optimizations in solidity smart contracts☆159Updated 2 years ago
- Static analyzer for solidity contracts based on regexs specifically crafted for code4rena contests☆235Updated 3 years ago
- Download sources of deployed contracts from etherscan☆86Updated last month
- ☆30Updated last year
- template for efficient paradigm ctf testing & scripts☆154Updated 2 years ago
- Foundry Test Suit to test weird ERC20 behavior☆238Updated 2 years ago
- 10 More EVM Puzzles☆170Updated last year
- This repository contains my Rareskills Solidity Bootcamp work.☆129Updated last year
- A collection of solo audit reports by web3 security experts☆105Updated last year
- Solidity CTF challenges for mrstealyocrypto.xyz (foundry)☆140Updated last year
- ☆91Updated last year
- All things Uniswap☆183Updated last year
- ☆135Updated last year
- ☆103Updated 2 years ago
- A comparison of solidity fuzzing tools Foundry, Echidna & Medusa☆162Updated 5 months ago
- The Auditor Book☆232Updated last year
- Sherlock audit and coverage reports☆129Updated this week
- Resources for the budding field of risk modelling and analysis in DeFi☆158Updated last year
- Hacks/Vulns/Audits Compilation☆163Updated 10 months ago
- Ethernaut puzzles solved with foundry☆277Updated 2 years ago
- Audit-365 is a challenge for me where I will be posting educational content related to Smart contract auditing and web3 security througho…☆121Updated 2 years ago
- Workshop about the different types of reentrancy attacks☆128Updated 3 months ago
- ☆63Updated 3 years ago
- Practical tutorials of Certora Prover☆238Updated last year
- A collection of my personal security audits☆68Updated 2 months ago
- ☆228Updated 2 years ago
- easy POC template generation from the command line☆319Updated last year