ctfwriteup.com
Search…
⌃K
/home/ret2basic.eth
EVM Auditing
Capture the Ether
Ethernaut
Damn Vulnerable DeFi
DeFiVulnLabs
✅
Integer Overflow 1
✅
Integer Overflow 2
✅
Selfdestruct 1
✅
Selfdestruct 2
✅
Unsafe Delegatecall
✅
Reentrancy
Read Only Reentrancy
ERC777 callbacks and reentrancy
Unchecked external call - call injection
Private data
Unprotected callback - NFT over mint
Backdoor assembly
Bypass iscontract
DOS
Randomness
Visibility
txorigin - phishing
Uninitialized state variables
Storage collision 1
Storage collision 2 (Audius)
Approval scam
Signature replay 1
Signature replay 2 (NBA)
Data location - storage vs memory
DirtyBytes
Invariants
NFT Mint via Exposed Metadata
Divide before multiply
Unchecked return value
DeFiHackLabs
✅
EVM Puzzles
✅
More EVM Puzzles
QuillCTF
unhacked
EKO Blockchain CTF 2022
Paradigm CTF 2022
Pentest
Hack The Box
TCM Windows Privilege Escalation Course
TCM Linux Privilege Escalation Course
Pwn
pwn.college
pwnable.kr
pwnable.tw
ROP Emporium
Jarvis OJ Pwn Xman Series
Game Hacking
🏝
Pwnie Island
Crypto
Jarvis OJ Crypto RSA Series
picoCTF
picoCTF 2020 Mini-Competition
picoCTF 2021
picoMini by redpwn
Powered By
GitBook
ERC777 callbacks and reentrancy
DeFiVulnLabs/ERC777-reentrancy.sol at main · SunWeb3Sec/DeFiVulnLabs
GitHub
ERC777 callbacks and reentrancy
ERC777 tokens allow arbitrary callbacks via hooks that are called during token transfers. Malicious contract addresses may cause reentrancy on such callbacks if reentrancy guards are not used.
REF1
,
REF2
,
Cream POC
ERC667 reentrancy
|
ERC827 reentrancy
Code Audit
Solution
Previous
Read Only Reentrancy
Next
Unchecked external call - call injection
Last modified
24d ago