GOATCasino
Exploit simulator
A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment
This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to exploit a wide variety of issues in a safe environment.
116 stars
13 watching
30 forks
Language: JavaScript
last commit: over 6 years ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| An educational project demonstrating common security attacks and vulnerabilities in GitHub Actions CI/CD environments | 445 |
| A DeFi smart contract training tool that simulates real-world vulnerabilities to help developers learn offensive security testing skills | 495 |
| A tool for generating intentionally insecure cloud infrastructure for testing and auditing purposes | 666 |
| A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 564 |
| A tool to demonstrate common vulnerabilities in web applications and provide guidance on fixing them. | 712 |
| A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| A Solidity-based smart contract framework for learning and interacting with Ethereum contracts | 17 |
| An environment for testing AI agents against a simulated network | 171 |
| An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |
| A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| A tool for simulating phishing attacks in red teaming exercises. | 1,451 |
| A tool for creating and managing vulnerable environments in cloud computing platforms. | 269 |
| An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| A utility to generate malicious network traffic patterns and evaluate security controls. | 1,271 |
| A training project that demonstrates how common configuration errors can be introduced into cloud infrastructure to test secure development best practices | 1,159 |