theori-io / web3-publicationsView external linksLinks
Collection of Web3 Audits and Publications by ChainLight of Theori
☆14Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for web3-publications
Users that are interested in web3-publications are comparing it to the libraries listed below
Sorting:
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- ☆11Feb 10, 2026Updated last week
- ☆14Aug 28, 2023Updated 2 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- A curated list of security related material for the growing starknet ecosystem particularly cairo smart contracts.☆14Jun 11, 2022Updated 3 years ago
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆75Dec 11, 2025Updated 2 months ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 4 years ago
- KIISC Digital Forensics Challenge 2021 - DogeCoin's WriteUp☆17Dec 1, 2022Updated 3 years ago
- My swiss army knife for reversing EVM bytecodes (super experimental)☆126Nov 25, 2025Updated 2 months ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 10 months ago
- ☆25Updated this week
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Zigtur's audit reports for private clients☆33Feb 7, 2026Updated last week
- Formal verification of WETH9.sol with Z3☆59Nov 19, 2022Updated 3 years ago
- ☆22May 9, 2025Updated 9 months ago
- ☆26Oct 26, 2023Updated 2 years ago
- UniswapV2 smart contract explained - code and maths breakdown - how it works☆27Dec 28, 2022Updated 3 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- Self-modifying malware in Rust☆29Sep 14, 2022Updated 3 years ago
- ☆27Mar 27, 2024Updated last year
- ☆30Jun 29, 2023Updated 2 years ago
- Code used to run the platform for the LLM CTF colocated with SaTML 2024☆28Mar 20, 2024Updated last year
- A portfolio repository for Egis Security's past audits☆62Nov 7, 2025Updated 3 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- Public challenges from past UMDCTF competitions☆34May 3, 2025Updated 9 months ago
- X-MAS CTF 2021 Ethereum challenges☆29Dec 21, 2021Updated 4 years ago
- A markdown based template for writing spearbit reports☆68Mar 18, 2022Updated 3 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Jul 27, 2022Updated 3 years ago
- APG (Auditor Profile Generator)☆35Dec 4, 2023Updated 2 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- ☆80Nov 17, 2022Updated 3 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- ☆41Mar 29, 2023Updated 2 years ago