tenthirtyone / ethereum_better_honey_pot
☆11Updated 6 years ago
Related projects: ⓘ
- Safely explore a known honeypot contract using a forked network☆20Updated last year
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆144Updated last year
- A series of attack tests on commonly used libraries and contracts in the ethereum web space☆20Updated 6 years ago
- Some examples of Solidity tricks and writeups of valuable bugs (in progress)☆45Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 8 years ago
- CLI client for the MythX API☆20Updated last year
- Yet another Solidity decompiler, WIP☆42Updated 3 years ago
- An RPC attack framework for Blockchain nodes.☆95Updated last year
- A checklist of things to look for when auditing Solidity smart contracts.☆69Updated 6 years ago
- A Blockchain And Smart Contract Based CTF☆15Updated last year
- Solidity Contract Function Profiler☆80Updated 5 years ago
- ☆90Updated 2 months ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆112Updated 5 years ago
- Ethereum/EVM Node Security Toolkit☆68Updated 2 months ago
- Useful snippets of js code for interacting with Smart Contracts☆58Updated 2 years ago
- ☆203Updated this week
- Smart contract auditing assistant tool for Truffle Framework.☆18Updated last year
- Learn smart contract security by hacking popular smart contract systems.☆98Updated 6 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- evil jar attack technical post-mortem☆138Updated 3 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Updated 3 years ago
- ☆16Updated this week
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 5 years ago
- Complete examples of solidity exploits☆13Updated 6 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆29Updated last month
- Graveyard of past Web3 exploits☆21Updated 2 years ago
- Exercises to go along with smart contract security workshops by MythX and ConsenSys Diligence☆41Updated 3 years ago
- A simple and decentralized protocol for flash loan. https://t.me/Uniflash☆95Updated 11 months ago
- ☆192Updated 2 years ago
- Comprehensive framework that identifies, categorizes, and mitigates Web3-related attacks and vulnerabilities☆48Updated 7 months ago