EthSecurity
5.22K subscribers
112 photos
20 files
760 links
Download Telegram
Forwarded from Geek girl 👩‍💻
This page contains all the resources related to application security and penetration testing shared by Harsh Bothra.👀
این صفحه شامل تمام منابع مربوط به امنیت برنامه و تست نفوذ است که توسط هارش بوترا به اشتراک گذاشته شده است.👀

https://resources.harshbothra.tech/

●▬۩❁
@geeekgirls ❁۩▬●
Forwarded from YourAnonS0u1 (S0u1)
README.txt
4.6 KB
How you can help with the protest in #OpIran #Anonymous
Want to get up to speed with Modern Solidity? Then check out @ethchris' remote presentation for #SmartCon, which covers IR pipeline, errors and encoding, immutable, user defined value types, generics, standard lib and reference checking! #xp
📺: youtu.be/j8esg5KHMv0?li
the things men will do for extensible token permissioning schemes
💎snowflake proxy use for tor and TG IP:127.0.0.1 Port:9150
anon, not sure u know about it but there is a maximum limit on how many transactions an account can make. The theoretical allowed limit, based on EIP-2681, for an account nonce is 2**64-2:
https://eips.ethereum.org/EIPS/eip-2681. After that, the EVM implementations like Geth would revert.
🤯1
It's extremely easy to create a "spoof" token to trick users into thinking a real token has been transferred.

In fact, it only took 16 lines of code to create this fake USDT token below.

Here's how spoof tokens work and how you can avoid being fooled going forward 🧵: https://twitter.com/0xCygaar/status/1592248453970952192