RSS.Social

consolecowboys

follow: @[email protected]

Posts

Bypassing Alarm Systems - Alarm System Labs CTF Walkthrough

NEW Stealth Reader Design - Field notes and use cases covering updated hardware and functionality

Red Team - Over My Shoulder Shadowing Assessing Door Access Control Systems

Red Team - Over My Shoulder Shadowing while performing Embedded Recon and Opportunistic Attacks

Layer 8 Social Engineering Podcast Interview

Attacking MFA Pin Code Readers - Social Engineering Physical & Electronic

Interview I did with Covert Access Team

Filling in the Gaps of your foundational Knowlege

Learning Binary Ninja for Reverse Engineering - Integrating AI workflows to Reverse Engineer Keygens

Real World Social Engineering Part 2: Integrating SE With Stealth Badge Readers Tips and Tricks

Learning Binary Ninja For Reverse Engineering and Scripting

Real World Social Engineering - Turning life into a Penetration Test or one Hell of an Adventure

New Consulting Series Financial Statement Workshop

Web3 Smart Contract and Blockchain Hacking with Python Free Course Section 1

Blockchain Decentralized Application Hacking Course Part 2 - A Continuation into Smart Contract Hacking and DApp Penetration Testing (Web 3) With Python

Blockchain Forensics R&D with Python - Tracking Attackers, Etherscan API Usage, Python Coding, Signature Lookups and Decompiling bytecode

Proxying Newer Versions of Android with Genymotion

Smart Contract Hacking Final Free Chapter - Hacking Games Via Bad Randomness Implementations on the Blockchain

Smart Contract Hacking Chapter 7 - Delegate Call Attack Vectors

Smart Contract Hacking Chapter 6 - Phishing Users With Malicious DAPS via TX.Origin

Smart Contract Hacking Chapter 5 - Understanding and Attacking Authentication & Authorization On The Ethereum Blockchain

Smart Contract Hacking Chapter 4 – Attacking Reentrancy Vulnerabilities

Smart Contract Hacking Chapter 3 – Attacking Integer Underflows and Overflows

Smart Contract Hacking Chapter 2 – Solidity for Penetration Testers Part 2

Smart Contract Hacking Chapter 1 - Solidity for Penetration Testers Part 1 (Hello World)