Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-ethereum-security
A curated list of awesome Ethereum security references
https://github.com/crytic/awesome-ethereum-security
Last synced: 3 days ago
JSON representation
-
Learning
-
Security references
-
Insecurity references
-
Capture the Flag and Wargames
- Capture the Ether
- Ethernaut
- EtherHack
- SI Blockchain CTF
- Hands on the Ethernaut CTF - Writeups for various Ethernaut CTF challenge contracts.
- Ethernaut - Naught Coin (ERC20) Exploitation - Writeup for a vulnerable ERC20 from the Ethernaut CTF.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- PolySwarm Smart Contract Hacking Challenge Writeup - Demonstrates advanced use of Manticore
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
- EtherHack CTF Writeup - Writeup for EtherHack CTF challenges.
-
Blogs
- Hacking Distributed - Emin Gün Sirer, professor in Cornell Tech’s IC3 lab focused on blockchain security.
- Phil Does Security - Phil Daian, grad student behind KEVM, Hydra, and other Ethereum academic projects
- Trail of Bits - Cybersecurity R&D firm with a blockchain security practice
- Martin Holst Swende - Martin Swende, programmer and appsec consultant
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
- SmartDec blog - Company blog about security issues and practices within blockchain ecosystem
-
Notable blog posts
- Contract upgrade anti-patterns
- How to debug Solidity Smart Contracts with Tenderly and Truffle
- Lashing out at a Spank Channel
- Malicious GasToken Minting
- Missing return value bug in ERC20 tokens
- Initial Formal Verification of Ethereum Casper Protocol
- Security considerations for Shamir's secret sharing
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- The phenomenon of smart contract honeypots
- Use our suite of Ethereum security tools
- Vertcoin (VTC) was successfully 51% attacked
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- How the winner got Fomo3D prize — A Detailed Explanation
- Not A Fair Game – Fairness Analysis of Dice2win
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- The phenomenon of smart contract honeypots
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
- SmartDec smart contract audit beginner's guide
- The Anatomy of a Block Stuffing Attack
-
Conference talks
-
Podcasts and Episodes
- CoinSec Podcast
- The Smartest Contract
- Zero Knowledge
- The Smartest Contract #15 - Trail of Bits’ Outlook on Security w/ JP Smith
- The Smartest Contract #8 - Smart Contract Security and Honeypots w/ Gerhard Wagner
- Zero Knowledge #29 - The DAO, the White Hat Hacker Group & Giveth w/ Griff Green
- Zero Knowledge #16 - Talking security with JP Smith from Trail of Bits
- Risky Business #488 - JP Smith about all things blockchain
-
Coordinated disclosure
- Blockchain Security Contacts - Security contact info for blockchain projects
-
-
Tools
-
Linters
- Remix - Browser-based Solidity IDE with linting features
- SmarrtCheck - A linter for Solidity and Vyper that checks code for security issues and bad practices.
- Solium - Linter for both security and style-guide validations. Does not strictly adhere to the Solidity Style Guide.
-
Bug finding tools
-
Reversing tools
-
Custody
- Subzero - Subzero is an HSM-backed method for cold storage of Bitcoin developed by Square
-
-
Communities
-
Other Awesome Lists
Categories
Sub Categories