bricks
Exploit builder
A collection of tools and resources to build, test, and learn about smart contract exploits on Ethereum blockchains.
Bricks is a sandbox and instruction manual collection for building smart contract exploits for Ethereum blockchains, designed to help developers think like hackers in a safe, fun environment.
29 stars
4 watching
28 forks
Language: JavaScript
last commit: over 4 years ago cybersecurityethereumganachehackslegosmanipulationoraclesrace-conditionssimulatorsoliditytddtruffle
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides a set of reusable, modular smart contract components for secure and efficient Ethereum development | 517 |
| A comprehensive package providing DeFi protocol data and utilities for Ethereum smart contract development | 1,030 |
| A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 900 |
| A Haskell-based tool for building and managing smart contracts on the Cardano blockchain | 67 |
| A step-by-step guide to building blockchains from scratch, starting with crypto hashes. | 667 |
| A DeFi smart contract training tool that simulates real-world vulnerabilities to help developers learn offensive security testing skills | 495 |
| A game where players drag and drop blocks to build a structure across a chasm while minimizing the center of mass. | 3 |
| A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. | 1,340 |
| Research and development of blockchain science tools and projects in Rust | 64 |
| Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 |
| A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment | 116 |
| A pre-configured development environment for building and testing Solidity smart contracts | 570 |
| A comprehensive resource and framework for building smart contracts in the Ethereum Virtual Machine | 60 |
| An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. | 897 |
| Automates the creation of intelligent agents without writing code using various Large Language Models. | 668 |