segunda-feira, 22 de janeiro de 2024

Blockchain Forensics R&D With Python - Tracking Attackers, Etherscan API Usage, Python Coding, Signature Lookups And Decompiling Bytecode

 Added a new playlist over the last few weeks, its up to about 8 videos now which starts out writing code to monitor attackers address changes on the blockchain followed by using EtherScan API's to track some movements and make sense of things with a few other learning points along the way...   

There is one pre-requisite video however which is where this series came from which is another video I created where we took apart a smart contract from a YouTube scam to find the attackers malicious code, so review that first below: 

Twitter: @ficti0n
Web: http://cclabs.io/


If you learn something from this blog/video consider sharing it on your social media or retweeting my posts.


Here is the Pre-Requisite Video to this series Which does a smart contract audit of a malicious front running bot: 



Here is the new playlist series which digs into tracking this attacker: 


Link to full Playlist since blogger is not letting me embed the playlist: 
https://www.youtube.com/playlist?list=PLCwnLq3tOElrUdIg4LgdhPhCKAiy7NZYA




Intro to the playlist: 


 

Related links
  1. Hacking Tools Online
  2. Nsa Hacker Tools
  3. Nsa Hack Tools Download
  4. Hacker Tools For Ios
  5. Hacking Tools For Windows 7
  6. Install Pentest Tools Ubuntu
  7. Beginner Hacker Tools
  8. World No 1 Hacker Software
  9. Hacker Tools Software
  10. Hacking Tools For Beginners
  11. Computer Hacker
  12. Android Hack Tools Github
  13. Pentest Tools For Android
  14. Hack Tools Pc
  15. Hacking Tools For Games
  16. Hacker Tools Free Download
  17. Hacker Tools
  18. Hacker Tools For Mac
  19. Pentest Reporting Tools
  20. Pentest Tools Android
  21. Hacking Tools Software
  22. Pentest Tools Kali Linux
  23. Pentest Box Tools Download
  24. Ethical Hacker Tools
  25. Wifi Hacker Tools For Windows
  26. Hack Rom Tools
  27. Hacking Tools Name
  28. World No 1 Hacker Software
  29. Hack Tools For Games
  30. Hack Tools For Games
  31. Hacking App
  32. Pentest Tools Online
  33. Hack Apps
  34. Pentest Tools Alternative
  35. Hacking Tools Hardware
  36. Pentest Tools Port Scanner
  37. Pentest Tools Subdomain
  38. Hack Tool Apk
  39. Usb Pentest Tools
  40. Pentest Tools Subdomain
  41. Hacker Tool Kit
  42. Hacking Apps
  43. What Is Hacking Tools
  44. Hacking Tools Online
  45. Ethical Hacker Tools
  46. Game Hacking
  47. Hacking Tools Free Download
  48. Pentest Tools Website
  49. Hacking Tools For Windows 7
  50. Pentest Tools Android
  51. Pentest Tools Linux
  52. New Hack Tools
  53. Pentest Automation Tools
  54. Hacking Tools And Software
  55. Hacking Tools Software
  56. Hacking Tools Windows 10
  57. Hacker Tools Mac
  58. Hacking Tools And Software
  59. Pentest Tools Free
  60. Hacking Tools 2020
  61. Hack Apps
  62. Hacker Techniques Tools And Incident Handling
  63. Hack Tools Mac
  64. Hacker Tools List
  65. Best Hacking Tools 2019
  66. Tools Used For Hacking
  67. Hacking Apps
  68. Hacker Tools Free
  69. Hacker Tools For Ios
  70. Hacking Tools For Windows
  71. Hacker Tools Mac
  72. Pentest Tools Bluekeep
  73. Hacking Tools Github
  74. Hack Tool Apk No Root
  75. Pentest Tools Windows
  76. How To Make Hacking Tools
  77. Hacking Tools For Windows
  78. Hacking Tools Download
  79. Easy Hack Tools
  80. Hacking Tools Usb
  81. Usb Pentest Tools
  82. Pentest Reporting Tools
  83. Pentest Tools Online
  84. Hacker Tools List
  85. Pentest Tools Alternative
  86. Hacking Tools Download
  87. Best Pentesting Tools 2018
  88. Pentest Tools Open Source
  89. Hacking Tools
  90. Tools Used For Hacking
  91. What Are Hacking Tools
  92. Hack Tool Apk
  93. Hack Tools Github
  94. Best Hacking Tools 2020
  95. Hack Tools 2019
  96. Pentest Tools Bluekeep
  97. Pentest Reporting Tools
  98. Hacker Search Tools
  99. Hacking Tools For Windows 7
  100. Blackhat Hacker Tools
  101. Physical Pentest Tools
  102. Pentest Tools Linux

Nenhum comentário:

Postar um comentário