Ivan Leskov's Projects
Lottery contract with VRF2 and Data Feed Aggregator
Lottery contract exercise
Welcome to the world of DARK ERC20 code. This repository is full of examples of malicious token contracts that will make you shake your head in disbelief. Let's learn together and make the world of blockchain a safer place, one contract at a time! Learn from these mistakes and keep your funds safe from sneaky scammers.
The user can buy an ERC-20 token, after sending the tokens to the manager's contract, they will be automatically locked, after that the user will receive NFT.
checking the emoralis SDK performace
BatchTransferHack
Parity Freeze Hack - Replicating the Vulnerability
Pausable Contract
The contract allows to mint any pokemon, as well as evolve them following the rules from the official game outside the blockchain.
Proxy Basic Upgradeable Contract
pull&push
My resume web page hosted on github pages
Hack preventing
List of all security tools
Sending Ether - How to do it safely
Proxy Upgradeability Considerations
Code coverage for Solidity smart-contracts
Token implementations
Storage patterns
A collection of NFT mutant robots with their frontend and marketplace. Robots can be modified and create new robots from their parts. Over 999 trillion combinations of different robots available!
Beta version of TechnoirClub
airdrop hardhat typescript file
ZK-rollups use ZKPs by combining a large number of Layer 2 transactions (off-chain) into one transaction that then gets mined on the Ethereum mainnet. Instead of mining 100s of transactions individually, they can be rolled up into a single transaction.