zzzuhaibmohd / AuditAnomaliesArchiveLinks
The repository reflects the collection of unusual findings from my smart contract audits.
☆15Updated last year
Alternatives and similar repositories for AuditAnomaliesArchive
Users that are interested in AuditAnomaliesArchive are comparing it to the libraries listed below
Sorting:
- ☆41Updated 2 months ago
- Web3.0 Audit Resources and Competition Materials☆19Updated last week
- CTF challenges made by MiloTruck☆97Updated 3 months ago
- ☆35Updated last year
- Smart contract auditing portfolio☆36Updated 2 months ago
- ☆60Updated last year
- Personal portfolio of audits that I have participated in.☆58Updated 2 months ago
- Foundry template to run Proof of Concept (PoC) fork tests on any EVM compatible chain.☆50Updated 2 years ago
- A security checklist for novel ERC4626 safety☆25Updated last year
- OpenZeppelin Ethernaut CTFs solutions using Foundry framework☆29Updated last year
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆68Updated 3 months ago
- ☆41Updated 11 months ago
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆30Updated last year
- Public profile of my adventure as a blockchain and smart contract security auditor.☆74Updated 3 months ago
- easy POC template generation from the command line☆76Updated last year
- Damn Vulnerable DeFi v4 Solutions☆47Updated last year
- This repository represents my portfolio of smart contract security audits and audit contest findings☆51Updated 9 months ago
- Immunefi Contract DB - Search Bugs☆32Updated 10 months ago
- ☆32Updated last year
- A datasette dashboard and source code downloader for Immunefi bug bounty data☆30Updated 9 months ago
- ☆56Updated 2 months ago
- ☆70Updated 2 months ago
- A collection of my security audits☆55Updated 3 months ago
- Index of Rareskill Blog posts using playwright☆21Updated last year
- Boilerplate test creation and Foundry initialisation for solidity smart contract audits☆20Updated 2 years ago
- ☆32Updated 3 years ago
- Security Reviews and Audit Checklists☆122Updated 3 months ago
- The good, the bad, and the ugly of proxy implementations☆104Updated last year
- ☆46Updated last year
- ☆65Updated 9 months ago