My eyes 🌚🔍😁
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
APIFY social media scrapers
400+ online tools (actors) for scraping data from Instagram, Twitter, Facebook, TikTok, YouTube and other social media.
console.apify.com/store-search?category=SOCIAL_MEDIA
Source
Apify
Apify Console
Manage Apify, a full-stack web scraping and data extraction platform.
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
New release: tree-sitter grammar for the circom language
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
"It is already integrated by @semgrep in the latest 1.86.0 release, so now you can write custom semgrep rules for your ZK circuits in circom."
https://github.com/decurity/tree-sitter-circom
Follow for more: @ethers_security
GitHub
GitHub - Decurity/tree-sitter-circom: Circom grammar for tree sitter
Circom grammar for tree sitter. Contribute to Decurity/tree-sitter-circom development by creating an account on GitHub.
❤1
Found a checklist for TRON Projects. Take a look🔮
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
https://github.com/PositiveSecurity/tron-audit-guide
Follow for more: @ethers_security
GitHub
GitHub - PositiveSecurity/tron-audit-guide: Checklist for security audit of tron projects by @positivesecurity
Checklist for security audit of tron projects by @positivesecurity - PositiveSecurity/tron-audit-guide
❤2
Top Phishing Techniques
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
September 2024 detailed review
- Bypass SPF
- Return-Path Mismatch
- Deepfakes or Vishing
- Homograph Attack and Typosquatting Attack
- DNS Hijacking
- Fast Flux
https://redteamrecipe.com/top-phishing-techniques
Author twitter.com/Hadess_security
Source
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
Be careful about upgrading to IOS 18.0. It is recommended to wait for more bug-free versions
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Also keep an eye on https://support.apple.com/en-us/100100
for security updates
Apple Support
Apple security releases - Apple Support
This document lists security updates and Rapid Security Responses for Apple software.
❤3
Forwarded from Cyber Detective
AI Privacy Guide
Guide to using AI technologies safely while protecting your privacy:
- self-hosted solutions
- popular AI services
- best practices
- practical setup instructions.
https://github.com/iAnonymous3000/ai-privacy-guide
Contributor twitter.com/iAnonymous3000
#ai #privacy
Guide to using AI technologies safely while protecting your privacy:
- self-hosted solutions
- popular AI services
- best practices
- practical setup instructions.
https://github.com/iAnonymous3000/ai-privacy-guide
Contributor twitter.com/iAnonymous3000
#ai #privacy
Daily Security
Don’t abuse please😅 - A selection of the best Telegram OSINT bots (Phones, punched numbers) https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/ - (Search for information on Telegram) https://hackyourmom.com/e…
added a couple more
https://molfar.com/en/useful-apps
https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/
https://molfar.com/en/useful-apps
https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/
Molfar
OSINT tools for intelligence – Molfar
Learn and use OSINT tools to search for information from open sources with the Molfar analysts. List of tools for OSINT intelligence online, new features in analytics!
Forwarded from Investigations by ZachXBT
The project Truflation was hacked a few hours ago for $5M+ on multiple chains from the treasury multisig and personal wallets
EVM theft address
0x53d2094b31429a13e739358b16354d8e0826b25a
0x2122a76213b23daf633b850cb659750db0cac801
0x4ec10144f1a96eed9b04d324d0997b5325c56472
0x7ea07c76328fc789435fc77a2a4d527c5bbc333e
0x3f8e5cc8abd032dd6ad652423e951ab06f833126
SOL theft address
6v4R3z5ahHqx3pbxMpYQMu26cuQoonLX2Rqq7WF35yzp
EVM theft address
0x53d2094b31429a13e739358b16354d8e0826b25a
0x2122a76213b23daf633b850cb659750db0cac801
0x4ec10144f1a96eed9b04d324d0997b5325c56472
0x7ea07c76328fc789435fc77a2a4d527c5bbc333e
0x3f8e5cc8abd032dd6ad652423e951ab06f833126
SOL theft address
6v4R3z5ahHqx3pbxMpYQMu26cuQoonLX2Rqq7WF35yzp
👍2
Check out a cool article from my colleague 😉
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
https://medium.com/@5m477/the-hidden-backdoors-of-blockchain-why-end-to-end-security-is-crucial-in-web3-328c83300379
Follow for more @ethers_security
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
https://medium.com/@5m477/the-hidden-backdoors-of-blockchain-why-end-to-end-security-is-crucial-in-web3-328c83300379
Follow for more @ethers_security
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
The Hidden Backdoors of Blockchain: Why End-to-End Security is Crucial in Web3
Imagine you’re building your dream house. You focus intently on fortifying the front door — reinforced steel, biometric locks, and the…
❤1👍1
Forwarded from Investigations by ZachXBT
In the past hour a victim was drained for 12K spWETH ($32.4M)
Theft txn hash
0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb
Theft address
0x471c725Bd1F29850CBb8eeA4cdf6c9Ce3caC5607
h/t ScamSniffer
Theft txn hash
0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb
Theft address
0x471c725Bd1F29850CBb8eeA4cdf6c9Ce3caC5607
h/t ScamSniffer
Looks interesting
A game for Ton Hackers
https://www.hacktheton.com/en
A checklist for Ton Developers
https://github.com/PositiveSecurity/ton-audit-guide
Tron checklist from previous post
https://news.1rj.ru/str/ethers_security/265
Ton Awesome Security
https://github.com/Polaristow/awesome-ton-security
TON Resources
https://x.com/arsen_bt/status/1883975409739686327
Follow for more @ethers_security
A game for Ton Hackers
https://www.hacktheton.com/en
A checklist for Ton Developers
https://github.com/PositiveSecurity/ton-audit-guide
Tron checklist from previous post
https://news.1rj.ru/str/ethers_security/265
Ton Awesome Security
https://github.com/Polaristow/awesome-ton-security
TON Resources
https://x.com/arsen_bt/status/1883975409739686327
Follow for more @ethers_security
Hacktheton
Hack the TON
TON Based Wargame
❤3
Forwarded from Anon
Hi, guys. Unfortunately, I am not so active in this half of the year due to personal reasons🥲 However, I am planning to fix it quite soon. Meanwhile, if the content on these resources helped you or your friends, I would be grateful for a donation🫶
Tron (TRC20)
TPyHztRbhq4SgRogmHHhUeAJpYjfrpmvab
EVM
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516
Tron (TRC20)
TPyHztRbhq4SgRogmHHhUeAJpYjfrpmvab
EVM
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1
Forwarded from Kotya security (Vladislove)
A great article showcasing that even in case everything has been compromised - the hardware wallet still can safe you on the example of the Radiant key compromise exploit. I personally use SafePal S1 as it doesn't have WiFi, Bluetooth or any other connections to the world - a fully offline device.
https://medium.com/@bazzanigianfranco/how-to-not-blind-signing-safe-multi-sign-transactions-with-our-hardware-wallet-abd0cee9226c
https://medium.com/@bazzanigianfranco/how-to-not-blind-signing-safe-multi-sign-transactions-with-our-hardware-wallet-abd0cee9226c
Medium
How to (not) blind-sign Safe multisig transactions with our hardware wallet
The screen on our hardware wallet is our last untamperable frontier when it comes to sign any transaction, it is crucial to double-check…
❤4👍1
Forwarded from Anon
Hi, everyone. A reminder that we have a chat where we share tools, researches and many other stuff. Do not hesitate to join 🔮❤️🫡
@ethers_club
@ethers_club
👍1
Forwarded from infinityhedge
URGENT: Blockaid systems have detected a potential supply chain attack targeting dApps that use Lottie Player.
A new version of this npm packaged was deployed a couple of minutes ago, with multiple legitimate dApps now issuing malicious transactions: link
DO NOT CONNECT YOUR WALLETS TO POP-UPS COMING ON WEBSITES
A new version of this npm packaged was deployed a couple of minutes ago, with multiple legitimate dApps now issuing malicious transactions: link
DO NOT CONNECT YOUR WALLETS TO POP-UPS COMING ON WEBSITES
Forwarded from infinityhedge
infinityhedge
URGENT: Blockaid systems have detected a potential supply chain attack targeting dApps that use Lottie Player. A new version of this npm packaged was deployed a couple of minutes ago, with multiple legitimate dApps now issuing malicious transactions: link…
1inch Front-End compromised
DO NOT CONNECT WALLET
DO NOT CONNECT WALLET