Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
netlas.io
Best Attack Surface Visualization Tools - Netlas Blog
Explore top tools that help visualize your attack surface, enabling better threat detection and improved security posture for your organization.
Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
ohshint.gitbook.io
OSINT? WTF?? | OH SHINT! It's A Blog!
What is open-source intelligence?
👍2
Forwarded from Cyber Detective
10 Essential #OSINT Newsletters You Should Subscribe to Today (by Nina Maelainine)
OSINT Team
OSINT Newsletter
OSINT Jobs
OSINT Ambition
Forensic OSINT
Digital Investigations
Cyber Detective
Gary Ruddell’s OSINT
OSINT Drip
Ervin Zubic on Medium
https://osintteam.blog/10-essential-osint-newsletters-you-should-subscribe-to-today-f97381760054
OSINT Team
OSINT Newsletter
OSINT Jobs
OSINT Ambition
Forensic OSINT
Digital Investigations
Cyber Detective
Gary Ruddell’s OSINT
OSINT Drip
Ervin Zubic on Medium
https://osintteam.blog/10-essential-osint-newsletters-you-should-subscribe-to-today-f97381760054
Forwarded from Cyber Detective
Cryptography for Hackers
1 hour reading guide:
Encryption and Decryption
Popular Cryptographic Methods
Hashing
Difference Between Data-at-Rest and Data-in-Transit
Finding the Cryptography Algorithm from Encrypted Text
and more
https://redteamrecipe.com/cryptography-for-hackers
Tip by twitter.com/Hadess_security
1 hour reading guide:
Encryption and Decryption
Popular Cryptographic Methods
Hashing
Difference Between Data-at-Rest and Data-in-Transit
Finding the Cryptography Algorithm from Encrypted Text
and more
https://redteamrecipe.com/cryptography-for-hackers
Tip by twitter.com/Hadess_security
❤1
My eyes 🌚🔍😁
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
Apify
Apify Console
Manage Apify, a full-stack web scraping and data extraction platform.
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
New release: tree-sitter grammar for the circom language
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
GitHub
GitHub - Decurity/tree-sitter-circom: Circom grammar for tree sitter
Circom grammar for tree sitter. Contribute to Decurity/tree-sitter-circom development by creating an account on GitHub.
❤1
Found a checklist for TRON Projects. Take a look🔮
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
GitHub
GitHub - PositiveSecurity/tron-audit-guide: Checklist for security audit of tron projects by @positivesecurity
Checklist for security audit of tron projects by @positivesecurity - PositiveSecurity/tron-audit-guide
❤2
Top Phishing Techniques
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
Be careful about upgrading to IOS 18.0. It is recommended to wait for more bug-free versions
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Apple Support
Apple security releases - Apple Support
This document lists security updates and Rapid Security Responses for Apple software.
❤3
Forwarded from Cyber Detective
AI Privacy Guide
Guide to using AI technologies safely while protecting your privacy:
- self-hosted solutions
- popular AI services
- best practices
- practical setup instructions.
https://github.com/iAnonymous3000/ai-privacy-guide
Contributor twitter.com/iAnonymous3000
#ai #privacy
Guide to using AI technologies safely while protecting your privacy:
- self-hosted solutions
- popular AI services
- best practices
- practical setup instructions.
https://github.com/iAnonymous3000/ai-privacy-guide
Contributor twitter.com/iAnonymous3000
#ai #privacy
Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
added a couple more
https://molfar.com/en/useful-apps
https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/
https://molfar.com/en/useful-apps
https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/
Molfar
OSINT tools for intelligence – Molfar
Learn and use OSINT tools to search for information from open sources with the Molfar analysts. List of tools for OSINT intelligence online, new features in analytics!
Forwarded from Investigations by ZachXBT
The project Truflation was hacked a few hours ago for $5M+ on multiple chains from the treasury multisig and personal wallets
EVM theft address
0x53d2094b31429a13e739358b16354d8e0826b25a
0x2122a76213b23daf633b850cb659750db0cac801
0x4ec10144f1a96eed9b04d324d0997b5325c56472
0x7ea07c76328fc789435fc77a2a4d527c5bbc333e
0x3f8e5cc8abd032dd6ad652423e951ab06f833126
SOL theft address
6v4R3z5ahHqx3pbxMpYQMu26cuQoonLX2Rqq7WF35yzp
EVM theft address
0x53d2094b31429a13e739358b16354d8e0826b25a
0x2122a76213b23daf633b850cb659750db0cac801
0x4ec10144f1a96eed9b04d324d0997b5325c56472
0x7ea07c76328fc789435fc77a2a4d527c5bbc333e
0x3f8e5cc8abd032dd6ad652423e951ab06f833126
SOL theft address
6v4R3z5ahHqx3pbxMpYQMu26cuQoonLX2Rqq7WF35yzp
👍2
Check out a cool article from my colleague 😉
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
https://medium.com/@5m477/the-hidden-backdoors-of-blockchain-why-end-to-end-security-is-crucial-in-web3-328c83300379
Follow for more @ethers_security
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
https://medium.com/@5m477/the-hidden-backdoors-of-blockchain-why-end-to-end-security-is-crucial-in-web3-328c83300379
Follow for more @ethers_security
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
Imagine you’re building your dream house. You focus intently on fortifying the front door — reinforced steel, biometric locks, and the…
❤1👍1
Forwarded from Investigations by ZachXBT
In the past hour a victim was drained for 12K spWETH ($32.4M)
Theft txn hash
0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb
Theft address
0x471c725Bd1F29850CBb8eeA4cdf6c9Ce3caC5607
h/t ScamSniffer
Theft txn hash
0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb
Theft address
0x471c725Bd1F29850CBb8eeA4cdf6c9Ce3caC5607
h/t ScamSniffer
Looks interesting
A game for Ton Hackers
https://www.hacktheton.com/en
A checklist for Ton Developers
https://github.com/PositiveSecurity/ton-audit-guide
Tron checklist from previous post
https://news.1rj.ru/str/ethers_security/265
Ton Awesome Security
https://github.com/Polaristow/awesome-ton-security
TON Resources
https://x.com/arsen_bt/status/1883975409739686327
Follow for more @ethers_security
A game for Ton Hackers
https://www.hacktheton.com/en
A checklist for Ton Developers
https://github.com/PositiveSecurity/ton-audit-guide
Tron checklist from previous post
https://news.1rj.ru/str/ethers_security/265
Ton Awesome Security
https://github.com/Polaristow/awesome-ton-security
TON Resources
https://x.com/arsen_bt/status/1883975409739686327
Follow for more @ethers_security
Hacktheton
Hack the TON
TON Based Wargame
❤3
Forwarded from Anon
Hi, guys. Unfortunately, I am not so active in this half of the year due to personal reasons🥲 However, I am planning to fix it quite soon. Meanwhile, if the content on these resources helped you or your friends, I would be grateful for a donation🫶
Tron (TRC20)
TPyHztRbhq4SgRogmHHhUeAJpYjfrpmvab
EVM
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516
Tron (TRC20)
TPyHztRbhq4SgRogmHHhUeAJpYjfrpmvab
EVM
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1