InImmunefibyImmunefi EditorTop 3 Bugs from the Shardeum Core Audit CompetitionFrom July 8 to August 14, 2024, the Shardeum protocol hosted two simultaneous audit competitions on the Immunefi platform, Shardeum Core…Oct 29
Kane WallmannRecovering Assets from a Hacked Account with FlashbotsFlashbots Auction is awesome. It allows advanced Ethereum users to do things that were once practically impossible (at least for those of…Nov 13, 20218
Leonidas GorgoProxy detection methodsHere are some common proxy detection techniques. — WhiteHatOct 25Oct 25
KerosThe New Dawn of Ethical Hacking: Germany’s Progressive MoveIn the dimly lit corner of a quaint café in Berlin, a young coder taps away at her laptop, her fingers dancing across the keyboard with a…Nov 25, 2023Nov 25, 2023
InImmunefibyImmunefi EditorTop 3 Bugs from the Shardeum Core Audit CompetitionFrom July 8 to August 14, 2024, the Shardeum protocol hosted two simultaneous audit competitions on the Immunefi platform, Shardeum Core…Oct 29
Kane WallmannRecovering Assets from a Hacked Account with FlashbotsFlashbots Auction is awesome. It allows advanced Ethereum users to do things that were once practically impossible (at least for those of…Nov 13, 20218
Leonidas GorgoProxy detection methodsHere are some common proxy detection techniques. — WhiteHatOct 25
KerosThe New Dawn of Ethical Hacking: Germany’s Progressive MoveIn the dimly lit corner of a quaint café in Berlin, a young coder taps away at her laptop, her fingers dancing across the keyboard with a…Nov 25, 2023
S3CuriosityUnmasking the Hydra: The Art of Ethical Hacking and Brute Force AttacksIntroductionOct 12, 2023
InInfoSec Write-upsbyAydin NaserifardInternet Bank Account Takeover of +1M Users Without User InteractionOAuth is an open protocol to allow authorization in a simple and standard method from web, mobile and desktop applications. OAuth is an…Jan 3, 2021