Block or Report
Block or report 0xJohnZW
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
A tool that performs extraction of storage layouts based on EVM bytecode.
Semgrep rules for smart contracts based on DeFi exploits
🐦🌴🌴🌴🦕 A home for ethereum smart contracts. 🏠
A Symbolic Ethereum Virtual Machine (EVM) bytecode interpreter, parser and decompiler, along with several other utils for programmatically extracting information from EVM bytecode.
Specification for the Execution Layer. Tracking network upgrades.
Find the version that the project you currently develop or audit uses and quickly check which are the known smart contract security vulnerabilities that may affect your code.
Extracts function selectors and arguments from bytecode, even for unverified contracts
Academic Smart Contract Papers. Welcome developers or researchers to add more published papers to this list.
Girl Friend <- Generate Foundry Fork Test from Attack Transaction
Super secret 100% practical EVM course. Please do not share
Python package with core transaction decoding functions.
Detect proxy contracts and their target addresses using an EIP-1193 compatible JSON-RPC request function
Code AI platform with Code Search & Cody
Interfaces for Relations and SNARKs for these relations
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A collection of practical security-focused guides and checklists for smart contract development
Master programming by recreating your favorite technologies from scratch.
High-performance Async REST API, in Python. FastAPI + GINO + Arq + Uvicorn (w/ Redis and PostgreSQL).
Free and Open Source Reverse Engineering Platform powered by rizin
Taho, the community owned and operated Web3 wallet.
Chia blockchain python implementation (full node, farmer, harvester, timelord, and wallet)
Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining critical codes.