Damn-Vulnerable-DeFi-V3-CTF
DeFi testbed
A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development
Damn Vulnerable DeFi V3 CTF implementation with Ape, exploits with Vyper & Huff
25 stars
1 watching
0 forks
Language: Solidity
last commit: about 2 years ago
Linked from 1 awesome list
apeworxevmhuffpythonsolidityvyper
Related projects:
Repository | Description | Stars |
---|---|---|
| A DeFi smart contract training tool that simulates real-world vulnerabilities to help developers learn offensive security testing skills | 495 |
| An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
| A collection of DeFi challenges with intentionally introduced vulnerabilities to simulate real-world security issues in Ethereum-based smart contracts. | 675 |
| A set of challenges to learn offensive security of smart contracts on Starknet using the Cairo language. | 21 |
| A comprehensive training and testing guide for common smart contract vulnerabilities in DeFi applications | 1,640 |
| Ethernaut CTF solutions and tools for learning smart contract development | 36 |
| An intentionally vulnerable API service designed to train developers, ethical hackers, and security engineers in detecting and exploiting vulnerabilities. | 455 |
| An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 187 |
| An intentionally vulnerable GraphQL implementation to test security | 1,518 |
| An intentionally vulnerable Android application designed to test security hacking skills | 656 |
| A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| An intentionally flawed web application showcasing common DOM-related vulnerabilities and security issues. | 36 |
| A proof-of-concept demonstrating the vulnerability of unsecured containers to privilege escalation attacks | 12 |
| A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data | 209 |
| An interactive platform for teaching and demonstrating attack and defense concepts in cybersecurity | 15 |