HackenProof Docs
search
⌘Ctrlk
HackenProof Docs
  • Welcome
    • HackenProof
    • Integrations
    • FAQ
    • Emergency
    • Code of Conduct
    • Referral Program
  • Bug Bounty
    • Bug Bounty process
    • How to start Bug Bounty
    • How to create a VDP
    • Vulnerability classification
    • Reports Basics
  • Dashboard
    • Company dashboard
    • Hacker dashboard
  • Crowdsourced audit
    • Audit process
    • How to start Audit
    • Supported tech
    • Vulnerability classification
    • Reports Basics
    • Qualified Auditors
    • Judging / Triaging
    • [CA] Bounty Distribution Rules
    • Fee & Payments
  • DualDefense Audit
    • What is DualDefence Audit
    • General Guidelines
    • How DualDefence Audit goes
    • Contest Phases
    • Vulnerability classification
    • [DD] Bounty Distribution Rules
  • good to know
    • Changelog
    • Branding
    • Vulnerability Disclosure
    • National CTF
  • Education
    • Courses
    • Tools
    • Useful sources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Education

Useful sources

  • solidity-patternsarrow-up-right

  • solcurityarrow-up-right

  • Smart Contract Security Verification Standardarrow-up-right

  • Consensys Smart-contract-best-practicesarrow-up-right

  • Security Pitfalls & Best Practices 101arrow-up-right

  • Security Pitfalls & Best Practices 201arrow-up-right

  • SWC Registryarrow-up-right

  • Kaden: Smart Contract Attack Vectorsarrow-up-right

  • Solidity Attack Vectorsarrow-up-right

  • Common Vulnerabilities in Smart contracts MindMaparrow-up-right

  • VigilSeek bug bounty aggregator arrow-up-right

  • VigilSeek telegram alerts channelarrow-up-right

PreviousToolschevron-left

Last updated 10 months ago