Stars
- All languages
- C
- C#
- C++
- CMake
- CSS
- Clojure
- CoffeeScript
- Cuda
- Dart
- Elixir
- Elm
- Emacs Lisp
- Erlang
- Frege
- Go
- HTML
- Handlebars
- Haskell
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Kotlin
- MDX
- Nix
- OCaml
- Objective-C
- Python
- R
- ReScript
- Reason
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Standard ML
- Swift
- TeX
- TypeScript
- Vala
- Vim Script
- Vue
An educational wiki for the Cosmos Hub that outlines the Hub's parameters, describes their functions, and describes the potential implications of modifying each parameter.
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
Framework for building smart contracts in Wasm for the Cosmos SDK
curation of all(most) immunefi bug bounty writeups I could find(till now)
deliriusz / turbopoc
Forked from zobront/quickpoceasy POC template generation from the command line
Girl Friend <- Generate Foundry Fork Test from Attack Transaction
Specification for the Execution Layer. Tracking network upgrades.
Blazing Fast Bytecode-Level Hybrid Fuzzer for Smart Contracts
Bugs in commonly forked DeFi protocols
This is the Rust course used by the Android team at Google. It provides you the material to quickly teach Rust.
This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed.
Simple Rust script for finding colliding 4byte function selectors
Observations and tips checklist for auditing protocols on multiple chains 🧐
These exercises were created for our Advanced Solidity Bootcamp and open sourced. Learn EVM bytecode with the Huff Language.
mds1 / multicall
Forked from makerdao/multicallMulticall: Aggregate multiple constant function call results into one
Demystifying Exploitable Bugs in Smart Contracts
State-of-the-art, highly opinionated, hyper-optimised, and secure 🐍Vyper smart contract building blocks.
Streamlined template for getting started with Foundry and Solmate.
Guidelines and training material to write secure smart contracts
A chronological and (hopefully) complete list of reentrancy attacks to date.
a proxy object that can compose transactions on owner's behalf
easy POC template generation from the command line