zaskoh / auditsLinks
zaskoh's smart contract security audits, reviews, and contributions
☆49Updated 2 years ago
Alternatives and similar repositories for audits
Users that are interested in audits are comparing it to the libraries listed below
Sorting:
- A collection of my personal security audits☆68Updated last month
- Personal portfolio of audits that I have participated in.☆58Updated last month
- CTF challenges made by MiloTruck☆96Updated 3 months ago
- Readiness Assessment for CARE Endeavour☆55Updated last year
- ☆36Updated 2 years ago
- ☆56Updated last month
- ☆32Updated 3 years ago
- This repository contains my Rareskills Solidity Bootcamp work.☆132Updated last year
- Public profile of my adventure as a blockchain and smart contract security auditor.☆74Updated 2 months ago
- All things Uniswap☆185Updated last year
- Practical tips for building secure web3 projects at every stage, from the initial design to deployment☆74Updated last month
- ☆91Updated 2 years ago
- A collection of solo audit reports by web3 security experts☆111Updated 2 years ago
- ☆113Updated last year
- A repository to house all the links, notes, photos, and random thoughts from previous D-squared YouTube recordings☆125Updated last year
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆30Updated last year
- Sharpen your smart contract auditing skills with this Training Ground - a platform to practice identifying vulnerabilities discovered in …☆96Updated last year
- ☆87Updated 3 years ago
- ☆41Updated last month
- ☆136Updated last year
- ☆63Updated 3 years ago
- ☆34Updated last year
- ☆53Updated last year
- Smart contract auditing portfolio☆36Updated last month
- Audit-365 is a challenge for me where I will be posting educational content related to Smart contract auditing and web3 security througho…☆121Updated 2 years ago
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Updated 2 years ago
- Security Reviews and Audit Checklists☆122Updated 2 months ago
- Workshop about the different types of reentrancy attacks☆133Updated 6 months ago
- The good, the bad, and the ugly of proxy implementations☆104Updated last year
- ☆46Updated last year