Published inCoinmonksHow to Identify and Prevent Address Poisoning AttacksUncovering the Address Poisoning Incident and Preventing Cryptocurrency Losses Before It’s Too Late.May 20May 20
Published inInfoSec Write-upsEffortless Android Pen Testing on Macbook M1 and M2 (2024)Unlock the power of Android pen testing on Macbooks M1 and M2 with our comprehensive, step-by-step setup guide for practical success.Feb 82Feb 82
Published inInfoSec Write-upsDecrypting the $197 Million Euler Finance ExploitDissecting Euler Finance Examining the $197 Million Fraud Behind the Flash Loan AttackJan 231Jan 231
Published inCoinmonksA Guide on Crafting Robust Invariants with EchidnaMaster the art of crafting and testing robust invariants with Echidna — an essential guide for smart contract security.Jan 3Jan 3
Published inInfoSec Write-upsFuzzing Strategies Every Solidity Developer Should KnowExplore advanced smart contract security with Echidna — your go-to tool for automated vulnerability detection in Solidity, ensuring robust…Dec 10, 2023Dec 10, 2023
Published inInfoSec Write-ups22.6k+ GitHub Stars Note-Taking App Hit by XSS VulnerabilityCVE-2023–3067: Stored Cross Site Scripting Vulnerability on renowned note-taking thick client app TrilliumSep 17, 2023Sep 17, 2023
Published inInfoSec Write-upsSmart Contract Vulnerabilities Audit Checklist 2023List of Smart Contract Security Vulnerabilities for AuditingJul 11, 2023Jul 11, 2023
Published inInfoSec Write-upsSmart Contract Best PracticeTop 20 Smart Contract Security Best Practices ChecklistJun 23, 2023Jun 23, 2023
Published inInfoSec Write-upsSmart Contract Security Overview 2023Detailed Analysis of Projects & Blockchain CompromisedJun 14, 2023Jun 14, 2023
Published inTechiepediaA Tail of Reflected XSS VulnerabilityHello Infosec Community,Apr 15, 20211Apr 15, 20211