
"Dive into EVM Attacks: The Ultimate Guide to Smart Contract Vulnerabilities"
Introduction: As the world of blockchain and smart contracts continues to grow, so does the potential for vulnerabilities and attacks. If you've ever wanted to learn about EVM attacks, we've got just the thing for you! We've stumbled upon a fantastic resource - a collection of Foundry tests that reproduce exploits, bug bounty reports, and theoretical vulnerabilities on EVM chains. In this article, we'll introduce you to this treasure trove, and in future posts, we'll ...

The Future of AI-Powered Militaries: Unveiling Palantir's Artificial Intelligence Platform
The world of artificial intelligence (AI) continues to expand, and its applications are becoming more diverse and sophisticated. Recently, Palantir announced its Artificial Intelligence Platform (AIP), a revolutionary tool that's set to transform the future of military and defense operations. In this article, we'll explore the key features of AIP and how it's poised to become a critical tool for modern militaries.AIP: A Game Changer for Military Operations Palantir's AIP b...

Don't Fall for the MEV Trap: How Scammers Take Advantage of Crypto Enthusiasts
https://twitter.com/functi0nZer0/status/1652791534960496640/photo/2 In the ever-evolving world of cryptocurrencies, scammers are always looking for new ways to prey on unsuspecting victims. One recent example is the emergence of shady transactions surrounding MEV (Miner Extractable Value). In this article, we'll delve into the workings of a particular address that has been raking in thousands of dollars by taking advantage of those who fall for the scam.https://twitter.com/functi0nZer0/s...
Information Security Savant - with a focus on threat emulation and pushing the boundaries of information security. #CISO #Dad InfoSec Jesus



"Dive into EVM Attacks: The Ultimate Guide to Smart Contract Vulnerabilities"
Introduction: As the world of blockchain and smart contracts continues to grow, so does the potential for vulnerabilities and attacks. If you've ever wanted to learn about EVM attacks, we've got just the thing for you! We've stumbled upon a fantastic resource - a collection of Foundry tests that reproduce exploits, bug bounty reports, and theoretical vulnerabilities on EVM chains. In this article, we'll introduce you to this treasure trove, and in future posts, we'll ...

The Future of AI-Powered Militaries: Unveiling Palantir's Artificial Intelligence Platform
The world of artificial intelligence (AI) continues to expand, and its applications are becoming more diverse and sophisticated. Recently, Palantir announced its Artificial Intelligence Platform (AIP), a revolutionary tool that's set to transform the future of military and defense operations. In this article, we'll explore the key features of AIP and how it's poised to become a critical tool for modern militaries.AIP: A Game Changer for Military Operations Palantir's AIP b...

Don't Fall for the MEV Trap: How Scammers Take Advantage of Crypto Enthusiasts
https://twitter.com/functi0nZer0/status/1652791534960496640/photo/2 In the ever-evolving world of cryptocurrencies, scammers are always looking for new ways to prey on unsuspecting victims. One recent example is the emergence of shady transactions surrounding MEV (Miner Extractable Value). In this article, we'll delve into the workings of a particular address that has been raking in thousands of dollars by taking advantage of those who fall for the scam.https://twitter.com/functi0nZer0/s...
Share Dialog
Share Dialog
Information Security Savant - with a focus on threat emulation and pushing the boundaries of information security. #CISO #Dad InfoSec Jesus

Subscribe to Assune.ETH

Subscribe to Assune.ETH
<100 subscribers
<100 subscribers

I hope you all are doing well and fine! Welcome to the awesome world of Blockchain Security. As promised in my introductory Genesis 0x00 post, I am back with the first edition of our Genesis Series. For those who don’t know what Genesis is; Let’s briefly introduce this series.
Genesis is a series of weekly articles on Blockchain Security, which will include interesting topics such as Blockchain basics, Blockchain Development, Ethereum 101, Building Dapps, Common vulnerabilities in smart contracts, Auditing Solidity source code, Static analysis of Smart contracts, latest news and the future state of DeFi.
Without knowing how an application/protocol/framework is built or structured, we cannot proceed further with its security audit or find any vulnerabilities in it. However, Suppose you do manage to find actual vulnerabilities in a smart contract or any blockchain protocol without having any prior knowledge of how it is built and structured. In that case, You were just throwing arrows in the dark and got lucky.
To a great extent, your ability to break into an application is directly proportional to your understanding of how that application is built and structured; that said we will be focusing on blockchain development before we jump to the security aspects related to it.
This article will be laying down a path/roadmap for us, following which we will enter into the field of Blockchain Security together 🤝.
All you need is the plan, the road map, and the courage to press on to your destination. - Earl Nightingale
This Roadmap is not exhaustive, but it is organized and covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security. It also acts as a guide to our future articles in Genesis Series.
Note: I handpicked these topics and links to the resources listed below, all of these resources are 100% free. In my coming articles in the Genesis Series, we will be starting from Blockchain Basics (skipping rudimentary topics such as basics of internet, Web2.0 security, etc).
Elementary Topics:
Understanding of commonly used bash commands.
Understanding of version control systems such as Git ,Github, Gitlab , etc.
What is CI/CD pipeline.
For your convenience in tracking your progress while following the above roadmap, I am sharing a publicly readable version of my Notion notes, which you can copy to your own Notion notebook as a template for tracking your progress.
Link to my notion notebook can be found here.
That was all from my side in this article. See you very soon in Genesis 0x02. Keep warm, stay hydrated, and have a good day ahead :)

I hope you all are doing well and fine! Welcome to the awesome world of Blockchain Security. As promised in my introductory Genesis 0x00 post, I am back with the first edition of our Genesis Series. For those who don’t know what Genesis is; Let’s briefly introduce this series.
Genesis is a series of weekly articles on Blockchain Security, which will include interesting topics such as Blockchain basics, Blockchain Development, Ethereum 101, Building Dapps, Common vulnerabilities in smart contracts, Auditing Solidity source code, Static analysis of Smart contracts, latest news and the future state of DeFi.
Without knowing how an application/protocol/framework is built or structured, we cannot proceed further with its security audit or find any vulnerabilities in it. However, Suppose you do manage to find actual vulnerabilities in a smart contract or any blockchain protocol without having any prior knowledge of how it is built and structured. In that case, You were just throwing arrows in the dark and got lucky.
To a great extent, your ability to break into an application is directly proportional to your understanding of how that application is built and structured; that said we will be focusing on blockchain development before we jump to the security aspects related to it.
This article will be laying down a path/roadmap for us, following which we will enter into the field of Blockchain Security together 🤝.
All you need is the plan, the road map, and the courage to press on to your destination. - Earl Nightingale
This Roadmap is not exhaustive, but it is organized and covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security. It also acts as a guide to our future articles in Genesis Series.
Note: I handpicked these topics and links to the resources listed below, all of these resources are 100% free. In my coming articles in the Genesis Series, we will be starting from Blockchain Basics (skipping rudimentary topics such as basics of internet, Web2.0 security, etc).
Elementary Topics:
Understanding of commonly used bash commands.
Understanding of version control systems such as Git ,Github, Gitlab , etc.
What is CI/CD pipeline.
For your convenience in tracking your progress while following the above roadmap, I am sharing a publicly readable version of my Notion notes, which you can copy to your own Notion notebook as a template for tracking your progress.
Link to my notion notebook can be found here.
That was all from my side in this article. See you very soon in Genesis 0x02. Keep warm, stay hydrated, and have a good day ahead :)
Familiarity with Package Managers (npm, yarn, pnpm, pip).
Basics of Internet:
What is DNS (What happens behind the scenes when you type google.com in web browser).
What is HTTP Protocol and how it works.
What are HTTP Request and Response headers.
What is RPC Protocol.
Web2.0 (how a typical Web2.0 application is packaged and deployed).
Existing Authentication/Authorization models in Web2.0 applications.
Web 2.0 Security:
OWASP Top 10:
Basics of Blockchain:
Basics of Ethereum:
Understanding Solidity
What are Predefined Global Variables and Functions (msg.sender, msg.value, msg.gas, msg.data, msg.sig, etc).
Interacting with smart contracts using an external library such as web3.js or web3.py
Frameworks for Ethereum development:
Smart Contract Security:
Visualization Tools:
Linters and formatters:
Common Vulnerabilities in Smart contracts:
Static and Dynamic Analysis:
Blockchain CTFs:
The future of Ethereum:
Familiarity with Package Managers (npm, yarn, pnpm, pip).
Basics of Internet:
What is DNS (What happens behind the scenes when you type google.com in web browser).
What is HTTP Protocol and how it works.
What are HTTP Request and Response headers.
What is RPC Protocol.
Web2.0 (how a typical Web2.0 application is packaged and deployed).
Existing Authentication/Authorization models in Web2.0 applications.
Web 2.0 Security:
OWASP Top 10:
Basics of Blockchain:
Basics of Ethereum:
Understanding Solidity
What are Predefined Global Variables and Functions (msg.sender, msg.value, msg.gas, msg.data, msg.sig, etc).
Interacting with smart contracts using an external library such as web3.js or web3.py
Frameworks for Ethereum development:
Smart Contract Security:
Visualization Tools:
Linters and formatters:
Common Vulnerabilities in Smart contracts:
Static and Dynamic Analysis:
Blockchain CTFs:
The future of Ethereum:
Authorization through tx.origin
Authorization through tx.origin
No activity yet