ctfnote.com
Search
⌃K
/home/ret2basic.eth
Auditing
✅
Ethereum and Solidity
DeFi
Secureum
Beyond Secureum
Audit Findings
Foundry and Hardhat
EVM
MEV
DeFiHackLabs
Research
✅
Demystifying Exploitable Bugs in Smart Contracts
Invariant Testing WETH With Foundry
Blockchain Hacking Techniques 2022 Top 10 - Todo
Spearbit
DeFi Security Summit
cmichel
samczsun
DeGatchi
weiss.eth
Red Teaming
✅
Enumeration
✅
Exploitation
✅
Buffer Overflow
✅
Privilege Escalation
✅
Post Exploitation
✅
Pivoting
Active Directory (AD)
Command & Control (C2)
Malware Development
Cryptography
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Linux
Python
HTML, CSS, JavaScript, and React
C, C++, and C#
Data Structures and Algorithms
The Linux Programming Interface
Computer Systems
Databases
Distributed Systems
Static Analysis
Web
✅
Prerequisites
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
OS Command Injection
✅
Directory Traversal
HTTP Parameter Pollution
Server-Side Template Injection (SSTI)
LDAP Injection
Redis
Pwn
Linux Exploitation
Windows Exploitation
Fuzzing
Reverse
Bytecode
angr
Powered By
GitBook
Research
This section contains my writings on some random high-tech topics that don't belong to any other category. This is what independent research feels like.
Previous
20220902 Bad Guys by RPF
Next
Demystifying Exploitable Bugs in Smart Contracts
Last modified
2mo ago