KerosThe New Dawn of Ethical Hacking: Germany’s Progressive MoveIn the dimly lit corner of a quaint café in Berlin, a young coder taps away at her laptop, her fingers dancing across the keyboard with a…Nov 25, 2023
S3CuriosityUnmasking the Hydra: The Art of Ethical Hacking and Brute Force AttacksIntroductionOct 12, 2023Oct 12, 2023
Kaihua QinThe Blockchain Imitation GameExplore “copy-paste” tactics in DeFi, the first generalized imitation methodology, and how imitation flips from threat to safeguard.Jul 19, 20231Jul 19, 20231
Kane WallmannRecovering Assets from a Hacked Account with FlashbotsFlashbots Auction is awesome. It allows advanced Ethereum users to do things that were once practically impossible (at least for those of…Nov 13, 20217Nov 13, 20217
KerosThe New Dawn of Ethical Hacking: Germany’s Progressive MoveIn the dimly lit corner of a quaint café in Berlin, a young coder taps away at her laptop, her fingers dancing across the keyboard with a…Nov 25, 2023
S3CuriosityUnmasking the Hydra: The Art of Ethical Hacking and Brute Force AttacksIntroductionOct 12, 2023
Kaihua QinThe Blockchain Imitation GameExplore “copy-paste” tactics in DeFi, the first generalized imitation methodology, and how imitation flips from threat to safeguard.Jul 19, 20231
Kane WallmannRecovering Assets from a Hacked Account with FlashbotsFlashbots Auction is awesome. It allows advanced Ethereum users to do things that were once practically impossible (at least for those of…Nov 13, 20217
Sergej ZivkovicHTB Writeup — ToxicHere I am again, with another HackTheBox writeup. For today, we have a fairly simple and basic web challenge called Toxic.Jun 18, 2023
StackZeroSubdomain scanner made easy — with Python! — StackZeroHow to build your own subdomain scanner in python. Make it faster using threads and save a lot of time during your enumeration phase.Dec 8, 2021
Envelop DAOEnvelop launches bug bounty program on HackenproofEnvelop is a cross-chain protocol providing NFT2.0 features in a few clicks. Bug Bounty on Hackenproof.Jun 16, 2023