paradigm-ctf
Blockchain Exploit Script
A template for creating exploit scripts to test security vulnerabilities in smart contracts on the Paradigm blockchain
template for efficient paradigm ctf testing & scripts
154 stars
1 watching
33 forks
Language: Solidity
last commit: over 2 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A collection of puzzles and challenges focused on blockchain, crypto, and cybersecurity, built using Rust | 390 |
| | A collection of Ethereum-based challenges and puzzles designed to test problem-solving skills | 531 |
| | A curated list of blockchain security challenges and writeups | 1,514 |
| | A collection of over 200 CTF blockchain challenges, challenges and writeups for learning and practicing security testing | 862 |
| | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |
| | An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. | 897 |
| | An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique | 157 |
| | A curated collection of tools and resources for creating and solving Capture The Flag challenges | 256 |
| | A CTF framework to create, build, deploy and monitor challenges | 107 |
| | A collection of examples demonstrating ExEx patterns on the Reth framework for building blockchain applications in Rust. | 123 |
| | A collection of Cobalt Strike scripts designed to facilitate red teaming and exploitation | 800 |
| | A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| | A curated collection of exploits and vulnerabilities used in Capture The Flag (CTF) challenges | 1 |
| | A comprehensive security dataset and CTF platform designed to support information security professionals in analyzing and training on various attack scenarios | 367 |
| | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |