Protecting smart contracts against reverse engineering - Good Read! π
https://t.co/yRdikSZ91D
In this paper, Authors propose an automated #security enhancement tool for protecting smart contracts against reverse engineering π
https://t.co/yRdikSZ91D
In this paper, Authors propose an automated #security enhancement tool for protecting smart contracts against reverse engineering π
Free cybersecurity courses:
Ethical Hacking 12 Hours https://t.co/qjeI2JhkW2
OSINT in 5 Hours https://t.co/6hUKlWrH3F
Beginner Web Application Hacking https://t.co/upRxZiLYBA
Linux for Ethical Hackers https://t.co/h9fMoMTOKv
Buffer Overflows Made Easy
https://t.co/U8l6bEWXnf
Ethical Hacking 12 Hours https://t.co/qjeI2JhkW2
OSINT in 5 Hours https://t.co/6hUKlWrH3F
Beginner Web Application Hacking https://t.co/upRxZiLYBA
Linux for Ethical Hackers https://t.co/h9fMoMTOKv
Buffer Overflows Made Easy
https://t.co/U8l6bEWXnf
YouTube
Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
Full Course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
A shout out to all those involved with helping out on this course:
Alek β¦
All Course Resources/Links: https://github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
A shout out to all those involved with helping out on this course:
Alek β¦
Introducing ZDK: Zora Development Kit
Zora has the most fully featured and complete toolset:
β³ Hooks
β³ API
β³ ZDK
β³ Protocol
ZDK is a powerful dev tool for builders to easily create their own NFT platform, app and artworks.
https://t.co/HsJsZkgaGH https://t.co/EbunOQNVQF
Zora has the most fully featured and complete toolset:
β³ Hooks
β³ API
β³ ZDK
β³ Protocol
ZDK is a powerful dev tool for builders to easily create their own NFT platform, app and artworks.
https://t.co/HsJsZkgaGH https://t.co/EbunOQNVQF
Zora ZDK
The easiest way to work with NFT Data
A journey into #Ethereum 2.0 #Blockchain #Fuzzing and vulnerability discovery - Good Read! π
- https://t.co/UE8kT4OARc https://t.co/zQ3ThmCfvV
- https://t.co/UE8kT4OARc https://t.co/zQ3ThmCfvV
Why and how zk-SNARK works - Good Read! π§
https://t.co/8Kyh1kmnNb
The primary goal of this study is not only to explain how it works but why it works and how it came to be this way π
https://t.co/8Kyh1kmnNb
The primary goal of this study is not only to explain how it works but why it works and how it came to be this way π
Detecting nondeterministic payment bugs in #Ethereum smart contracts - Good Read! π§
https://t.co/D2Kf7L62cz https://t.co/kdd3YzfqpZ
https://t.co/D2Kf7L62cz https://t.co/kdd3YzfqpZ
π2
Advances in #Security and performance of #Blockchain systems - Good Read! π
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments π€― https://t.co/JQASdFGS4W
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments π€― https://t.co/JQASdFGS4W
Hindawi
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee.β¦
Advances in #Security and performance of #Blockchain systems - Good Read! π
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments π€― https://t.co/JQASdFGS4W
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments π€― https://t.co/JQASdFGS4W
Hindawi
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee.β¦
A low-latency commit-and-reveal architecture to mitigate #Blockchain front-running - Good Read! π
PDF: https://t.co/n523G63SQj
https://t.co/Dxe1l0OF2D https://t.co/TljXUAFVaL
PDF: https://t.co/n523G63SQj
https://t.co/Dxe1l0OF2D https://t.co/TljXUAFVaL
Just spotted an awesome project for which Authors put together all known MITM (Man-In-The-Middle) attacks and methods of protection against these attacks π
https://t.co/yq2DMpJPDt
https://t.co/yq2DMpJPDt
GitHub
GitHub - frostbits-security/MITM-cheatsheet: All MITM attacks in one place.
All MITM attacks in one place. Contribute to frostbits-security/MITM-cheatsheet development by creating an account on GitHub.
Presented Caulk yesterday at the zkStudyClub.
Thanks, @AnnaRRose @apruden08!
(https://t.co/1ym3WFCm0u)
https://t.co/5arBCoEWyX
Thanks, @AnnaRRose @apruden08!
(https://t.co/1ym3WFCm0u)
https://t.co/5arBCoEWyX
YouTube
Caulk: zkStudyClub: Caulk - Lookup Arguments in Sublinear Time (Arantxa Zapico)
This week, Arantxa Zapico of the Ethereum Foundation presents new work (co-authored with Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, and Mark Simkin) called Caulk, which examines position-hiding linkability for vector commitment schemes.β¦
DarkSide - Tool Information Gathering & social engineering https://t.co/kWlYS1fOfL
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource #Linux #windows #DFIR #socialengineering #darkweb #osint https://t.co/rFlWxtqX21
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource #Linux #windows #DFIR #socialengineering #darkweb #osint https://t.co/rFlWxtqX21
Hakin9 - IT Security Magazine
DarkSide - Tool Information Gathering & social engineering
DarkSide is a tool with an awesome user interface.
Cz:
Our threat intel detected a potential exploit on Uniswap V3 on the ETH blockchain. The hacker has stolen 4295 ETH so far, and they are being laundered through Tornado Cash. Can someone notify @Uniswap? We can help. Thanks
https://t.co/OV3g7ayf77
That was phishing π«
Our threat intel detected a potential exploit on Uniswap V3 on the ETH blockchain. The hacker has stolen 4295 ETH so far, and they are being laundered through Tornado Cash. Can someone notify @Uniswap? We can help. Thanks
https://t.co/OV3g7ayf77
That was phishing π«
Ethereum (ETH) Blockchain Explorer
Fake_Phishing5875 | Address 0x09b5027ef3a3b7332ee90321e558bad9c4447afa | Etherscan
The Address 0x09b5027ef3a3b7332ee90321e558bad9c4447afa page allows users to view transactions, balances, token holdings and transfers of ERC-20, ERC-721 and ERC-1155 (NFT) tokens, and analytics.
Denial-of-Service vulnerability of hash-based transaction sharding - Good Read! π§
PDF: https://t.co/pbf3KziZyW
https://t.co/CRpzEidYTf
PDF: https://t.co/pbf3KziZyW
https://t.co/CRpzEidYTf
Overcoming data availability attacks in #Blockchain systems - Good Read! π§
https://t.co/oTN1UO1ymP
Authors demonstrate that the EC-PEG algorithm coupled with a greedy sampling strategy improves the probability of detection of DA attacks π
https://t.co/oTN1UO1ymP
Authors demonstrate that the EC-PEG algorithm coupled with a greedy sampling strategy improves the probability of detection of DA attacks π
figshare
Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree
Light nodes in blockchains improve the scalability of the system by storing a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes acceptβ¦
If you're learning rust make sure you have the Ownership model down
Keep revisiting these resources until it sticks
Some Great Analogies to get you started
https://t.co/q38KkwvUS3
Deep Dive
https://t.co/33Q61DeEAK
For Readers - The Rust Book Ch 4
https://t.co/oFJWUiMspJ
Keep revisiting these resources until it sticks
Some Great Analogies to get you started
https://t.co/q38KkwvUS3
Deep Dive
https://t.co/33Q61DeEAK
For Readers - The Rust Book Ch 4
https://t.co/oFJWUiMspJ
YouTube
Learning Rust: Memory, Ownership and Borrowing
We go to some strange places in the computer...
* A rough model of the stack and heap.
* Copy and Cloning values
* The three rules of ownership
* Immutable and mutable borrows
* Slice borrowing
The Rust book: https://doc.rust-lang.org/book/secondβ¦
* A rough model of the stack and heap.
* Copy and Cloning values
* The three rules of ownership
* Immutable and mutable borrows
* Slice borrowing
The Rust book: https://doc.rust-lang.org/book/secondβ¦
Exploring #Web3 From the View of #Blockchain - Good Read! π§
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method π€― https://t.co/aKxA1QOgfM
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method π€― https://t.co/aKxA1QOgfM
Twitter
Exploring #Web3 From the View of #Blockchain - Good Read! π§
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method π€―
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method π€―