Skip to content

Commit

Permalink
♻️ Update Exploit Contract for 0x0 Attack
Browse files Browse the repository at this point in the history
Signed-off-by: Pascal Marco Caversaccio <[email protected]>
  • Loading branch information
pcaversaccio committed Oct 27, 2023
1 parent 6500f31 commit 4685019
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ A chronological and (hopefully) complete list of reentrancy attacks to date.
- [Earning.Farm attack](https://twitter.com/BeosinAlert/status/1689205260102094853) – 9 August 2023 | [Victim contract](https://etherscan.io/address/0x12Df0C95D2c549bbBC96cf8FbA02cA4Bc541aFD9), [Exploit contract](https://etherscan.io/address/0xFe141C32E36Ba7601D128F0C39DEdBE0F6aBb983), [Exploit transaction](https://etherscan.io/tx/0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa)
- [Defiway attack](https://twitter.com/AnciliaInc/status/1709352941541630049) – 3 October 2023 | [Victim contract](https://bscscan.com/address/0x6705d8196D06DA351371b6E0692fC18504ed4864), [Exploit contract](https://bscscan.com/address/0x0Bb02653ca1C3C4915CAE217aa02c16E68Ae381a), [Exploit transaction](https://bscscan.com/tx/0x6becb186ea8d701b2309da51e3420814036b9324dc56b9fb31bfbf96f7958e60)
- [Stars Arena attack](https://twitter.com/peckshield/status/1710555944269292009) – 7 October 2023 | [Victim contract](https://snowtrace.io/address/0xA481B139a1A654cA19d2074F174f17D7534e8CeC), [Exploit contract](https://snowtrace.io/address/0x7F283EDc5EC7163de234E6a97fDFb16FF2D2C7ac), [Exploit transaction](https://snowtrace.io/tx/0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5)
- [0x0 attack](https://twitter.com/MetaSec_xyz/status/1717854153324781709) – 27 October 2023 | [Victim contract](https://etherscan.io/address/0x3EBAA7507556F878ed62532143d5D344207b00f8), [Exploit contract](https://etherscan.io/address/0x8C07A96Fd504f34211771c2fA7Ce37F9565F6f00), [Exploit transaction](https://etherscan.io/tx/0x9d6d355db13361c0862f7d51913d7d31ea724dc25228782ea052f955a1d5b79d)
- [0x0 attack](https://twitter.com/MetaSec_xyz/status/1717854153324781709) – 27 October 2023 | [Victim contract](https://etherscan.io/address/0x3EBAA7507556F878ed62532143d5D344207b00f8), [Exploit contract](https://etherscan.io/address/0xfEb3390244A00253Daa61650dA20D2be85f0617c), [Exploit transaction](https://etherscan.io/tx/0x9d6d355db13361c0862f7d51913d7d31ea724dc25228782ea052f955a1d5b79d)

> Some of the exploits carried out involve multiple separate transactions as well as multiple victim and exploit contracts. For each attack, I have listed the most affected victim contract, the most critical exploit contract, and the most devastating exploit transaction.
Expand Down

0 comments on commit 4685019

Please sign in to comment.