Forwarded from pcaversaccio
4 years of work, and here we go: Vyper
0.4.0 got released featuring stateless and stateful modules: https://x.com/pcaversaccio/status/1803842453356597559X (formerly Twitter)
sudo rm -rf --no-preserve-root / (@pcaversaccio) on X
Today kicks off a groundbreaking chapter in smart contract development. Vyper `0.4.0` has landed, featuring stateless and stateful reusable library modules, a milestone four years in the making. Don't hesitate to touch the snake now—just import and go 🫡.…
Forwarded from Anon's Club
X (formerly Twitter)
EV_om (@0xEV_om) on X
A few weeks ago I shared https://t.co/BDrkg5kMdX, an IDE with integrated LLM prompting. What I haven't shared publicly yet is the biggest use case I have for it: report writing.
Contests still suffer from large amounts of low-quality reports, most of which…
Contests still suffer from large amounts of low-quality reports, most of which…
❤2
Interesting 👀
https://github.com/OpenZeppelin/cairo-contracts
https://github.com/OpenZeppelin/cairo-contracts
GitHub
GitHub - OpenZeppelin/cairo-contracts: OpenZeppelin Contracts written in Cairo for Starknet, a decentralized ZK Rollup
OpenZeppelin Contracts written in Cairo for Starknet, a decentralized ZK Rollup - OpenZeppelin/cairo-contracts
👍1
Check out the new updates and don't forget to star the repo💜
https://github.com/SunWeb3Sec/DeFiHackLabs
https://github.com/SunWeb3Sec/DeFiHackLabs
GitHub
GitHub - SunWeb3Sec/DeFiHackLabs: Reproduce DeFi hacked incidents using Foundry.
Reproduce DeFi hacked incidents using Foundry. Contribute to SunWeb3Sec/DeFiHackLabs development by creating an account on GitHub.
Highly recommend this research. Soon will attach additional resources to this post
https://www.youtube.com/watch?v=AD2IF8ovE-w
https://www.youtube.com/watch?v=AD2IF8ovE-w
YouTube
You Have To Know These 13 Critical Liquidation Vulnerabilities
Are you a security researcher looking to join a world-class team? Apply to open positions at Guardian here: https://guardianaudits.notion.site/Guardian-Open-Roles-a7e036d1087e4e0d8442d636fbddb655?pvs=4
10:00 Insolvent vs Liquidatable
15:41: 1# Liquidation…
10:00 Insolvent vs Liquidatable
15:41: 1# Liquidation…
Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
netlas.io
Best Attack Surface Visualization Tools - Netlas Blog
Explore top tools that help visualize your attack surface, enabling better threat detection and improved security posture for your organization.
Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
ohshint.gitbook.io
OSINT? WTF?? | OH SHINT! It's A Blog!
What is open-source intelligence?
👍2
Forwarded from Cyber Detective
10 Essential #OSINT Newsletters You Should Subscribe to Today (by Nina Maelainine)
OSINT Team
OSINT Newsletter
OSINT Jobs
OSINT Ambition
Forensic OSINT
Digital Investigations
Cyber Detective
Gary Ruddell’s OSINT
OSINT Drip
Ervin Zubic on Medium
https://osintteam.blog/10-essential-osint-newsletters-you-should-subscribe-to-today-f97381760054
OSINT Team
OSINT Newsletter
OSINT Jobs
OSINT Ambition
Forensic OSINT
Digital Investigations
Cyber Detective
Gary Ruddell’s OSINT
OSINT Drip
Ervin Zubic on Medium
https://osintteam.blog/10-essential-osint-newsletters-you-should-subscribe-to-today-f97381760054
Forwarded from Cyber Detective
Cryptography for Hackers
1 hour reading guide:
Encryption and Decryption
Popular Cryptographic Methods
Hashing
Difference Between Data-at-Rest and Data-in-Transit
Finding the Cryptography Algorithm from Encrypted Text
and more
https://redteamrecipe.com/cryptography-for-hackers
Tip by twitter.com/Hadess_security
1 hour reading guide:
Encryption and Decryption
Popular Cryptographic Methods
Hashing
Difference Between Data-at-Rest and Data-in-Transit
Finding the Cryptography Algorithm from Encrypted Text
and more
https://redteamrecipe.com/cryptography-for-hackers
Tip by twitter.com/Hadess_security
❤1
My eyes 🌚🔍😁
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
Apify
Apify Console
Manage Apify, a full-stack web scraping and data extraction platform.
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
New release: tree-sitter grammar for the circom language
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
GitHub
GitHub - Decurity/tree-sitter-circom: Circom grammar for tree sitter
Circom grammar for tree sitter. Contribute to Decurity/tree-sitter-circom development by creating an account on GitHub.
❤1
Found a checklist for TRON Projects. Take a look🔮
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
GitHub
GitHub - PositiveSecurity/tron-audit-guide: Checklist for security audit of tron projects by @positivesecurity
Checklist for security audit of tron projects by @positivesecurity - PositiveSecurity/tron-audit-guide
❤2
Top Phishing Techniques
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
Be careful about upgrading to IOS 18.0. It is recommended to wait for more bug-free versions
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Apple Support
Apple security releases - Apple Support
This document lists security updates and Rapid Security Responses for Apple software.
❤3