zenith-security / reportsLinks
☆33Updated last week
Alternatives and similar repositories for reports
Users that are interested in reports are comparing it to the libraries listed below
Sorting:
- CTF challenges made by MiloTruck☆96Updated last month
- The critical bug writeups☆122Updated 9 months ago
- This repository contains a curated collection of resources focused on auditing Move smart contracts. It includes tools, best practices, c…☆114Updated 2 months ago
- Smart Contract Audits and Findings by @0xJuancito☆31Updated last year
- ☆62Updated 6 months ago
- Audits and findings by MiloTruck☆173Updated last week
- easy POC template generation from the command line☆74Updated 11 months ago
- A list of public fuzzing campaigns☆119Updated last month
- ☆57Updated last year
- Portfolio of my work.☆66Updated last year
- Immunefi Contract DB - Search Bugs☆32Updated 8 months ago
- ☆96Updated last month
- Every time a Bug Bounty Program in Immunefi modifies its policy, assets-in-scope, or bounties-table, a bot will commit those changes to t…☆56Updated this week
- ☆31Updated last year
- Solo High severity findings from contests 2024☆29Updated 7 months ago
- ☆90Updated 2 years ago
- Security Reviews and Audit Checklists☆123Updated 2 weeks ago
- ☆63Updated 2 months ago
- weird ERC721 (NFTs) tokens☆83Updated 6 months ago
- Examples and POCs of Vulnerabilities that are unique to EVM contracts written without the guardrails of higher level languages like solid…☆127Updated last year
- Personal portfolio of audits that I have participated in.☆56Updated 2 weeks ago
- ☆87Updated 2 years ago
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆63Updated last week
- ☆38Updated 9 months ago
- Common security findings in smart contracts☆123Updated 2 years ago
- ☆47Updated last year
- ☆112Updated last year
- ☆51Updated 10 months ago
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Updated 2 years ago
- A framework that references, categorizes, and mitigates blockchain attack vectors.☆52Updated 2 months ago