GOATCasino
Exploit simulator
A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment
This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to exploit a wide variety of issues in a safe environment.
116 stars
13 watching
30 forks
Language: JavaScript
last commit: about 7 years ago
Linked from 2 awesome lists
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An educational project demonstrating common security attacks and vulnerabilities in GitHub Actions CI/CD environments | 445 |
| | A DeFi smart contract training tool that simulates real-world vulnerabilities to help developers learn offensive security testing skills | 495 |
| | A tool for generating intentionally insecure cloud infrastructure for testing and auditing purposes | 666 |
| | A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 564 |
| | A tool to demonstrate common vulnerabilities in web applications and provide guidance on fixing them. | 712 |
| | A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| | A Solidity-based smart contract framework for learning and interacting with Ethereum contracts | 17 |
| | An environment for testing AI agents against a simulated network | 171 |
| | An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |
| | A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| | A tool for simulating phishing attacks in red teaming exercises. | 1,451 |
| | A tool for creating and managing vulnerable environments in cloud computing platforms. | 269 |
| | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| | A utility to generate malicious network traffic patterns and evaluate security controls. | 1,271 |
| | A training project that demonstrates how common configuration errors can be introduced into cloud infrastructure to test secure development best practices | 1,159 |