Gevork Simonyan
@rootNadSecurity Researcher @hexensio | Web3 Security
Similar User
@xyz_remedy
@Ell_Mattador
@HaykKosyan
@tpiliposian
@k3mmio
@0xlyov
@p0wn4j
@teryanarmenn
@janestebans
@LauG5e
@IkutaKatsumi
@EllisJNorman1
@andrealbiac
@ioanamarin_
@piloniet
4 main topics at this @summit_defi: - audit contests - demand for audits - a new wave of complex bugs - how fking big is the @hexensio team What did I miss?
Since I started web3 security, I've thought about having a single resource to help someone become a security researcher without needing anything else. I realized it could be like a roadmap in book style. I’d be really happy if it’s of any help to you. github.com/tpiliposian/no…
Finding all public/external `withdraw()` functions without any modifier in the Ethereum mainnet being so easy... If you’re looking to find bugs in all verified contracts on the Ethereum mainnet or other chains, pls apply via the link in the reply 🫡
With this one-line query, you can find all functions on the Ethereum mainnet that transfer ownership without any modifier. If you’re looking to find bugs in all verified contracts on the Ethereum mainnet or other chains, the application link is in the reply 🫡
What a great resource and contribution to the Web3 sec community by @tpiliposian 🤝 Make sure to check it out anon! github.com/tpiliposian/Im…
Awesome FHE Attacks! We’ve compiled a curated list of research, articles, tools, and resources focused on attacks against Fully Homomorphic Encryption (FHE). Learn more about emerging attack vectors: github.com/Hexens/awesome…
We're planning to give Glider mainnet access to more researchers at the beginning of October. During this period, we are actively improving the user experience based on the feedback of security researchers. If you are interested in early access, please reach out!
With this query, you can find all functions on the Ethereum mainnet that, when working with ERC777 tokens, are vulnerable to reentrancy. If you’re looking to find bugs in verified contracts on the Ethereum mainnet or other chains, reach out to the Remedy team.
We're planning to give Glider mainnet access to more researchers at the beginning of October. During this period, we are actively improving the user experience based on the feedback of security researchers. If you are interested in early access, please reach out!
Presenting no.2 in our series of Interviews With Your Favorite Whitehats - this time with @tpiliposian Here are couple of highlights:
Glider is a program analysis engine with an easy-to-use query framework that can scan millions of smart contracts in seconds for complex patterns and attack vectors that can't be described with Semgrep, Slither, or other existing tools. Find 10x more bugs with Glider.
Just got confirmation one more bug critical bug identified with Glider has been accepted by a project team 🔥 While we get ready to disclose it to the public, be sure to watch @0xkasper's public talk video about previous cases
At #FilDevSummit, he discussed: 🪲 Finding a critical bug in @SoftProtocol and others 🎯 His method for writing precise queries 📄 Describing vulnerable patterns in Glider 💼 Real-world query alphas Learn from the best: youtu.be/pstplea5UYA
Elevate Your Cybersecurity with Us! 🔒 We provide top-notch services: • Penetration Testing / Red Teaming • Source Code Review • Cloud Security Services • Social Engineering • Stress Testing Our team consists of certified professionals, industry experts, and competition…
We provide one-of-a-kind cybersecurity tests for both Web3 and Web2 spaces. Founded by multiple CTF winners, top-notch professionals, OneGuard has inherited a legacy of excellence and a relentless commitment to safeguarding the digital world.
Excited to announce @0xkasper from @hexensio as a speaker at SecureFi Brussels 2024! Join us for his talk on "Finding Vulnerabilities by Querying Smart Contracts for Bug Patterns With Glider" and dive deep into cutting-edge Web3 security! Register now: tinyurl.com/SecureFi
🚨NEW CONTEST ALERT! Remedy’s back with the first in a series of contests we’ve appropriately called GLD-0. Submit an exceptional glider (it’s what we call queries on Glider😁) designed to hunt out a high or critical vulnerability and share in a prize pool of $1,400! 🧵1/2
Another scam scheme didn't work on @ubiqsmart 🥲 iykyk nvd.nist.gov/vuln/detail/CV…
Today we are finding all contracts in a given chain that have `_burn` function "mistakenly" set as public without any modifiers or requirements, allowing unrestricted access:
Remedy by @hexensio is finally here! 🚀 A 360º cybersecurity platform, Remedy is the most mad-hat thing we’ve tried - and done! - to tackle the biggest, baddest security challenges in Web3. 🧵👇
I remember the time when we took first place with our team in Standoff 10, now we are returning with our updated team and will do everything to take the best places. #hexenscr33d👊
United States Trends
- 1. $CUTO 7.558 posts
- 2. $CATEX N/A
- 3. $XDC 1.172 posts
- 4. DeFi 105 B posts
- 5. #Caturday 6.932 posts
- 6. GAME DAY 35 B posts
- 7. Good Saturday 33,8 B posts
- 8. #saturdaymorning N/A
- 9. Jayce 72 B posts
- 10. #SaturdayVibes 4.206 posts
- 11. #Arcane 279 B posts
- 12. Pence 86,1 B posts
- 13. #MSIxSTALKER2 5.155 posts
- 14. Senior Day 2.735 posts
- 15. McCormick-Casey 26,5 B posts
- 16. $XRP 95 B posts
- 17. Pennsylvania Democrats 116 B posts
- 18. Tyquan Thornton N/A
- 19. Fetterman 41,5 B posts
- 20. Mel Tucker N/A
Who to follow
-
Remedy
@xyz_remedy -
Armen Grigoryan
@Ell_Mattador -
Hayk Kosyan
@HaykKosyan -
Tigran Piliposyan
@tpiliposian -
kemmio
@k3mmio -
Lyov Hambardzumyan
@0xlyov -
Hayk Andriasyan
@p0wn4j -
Armen
@teryanarmenn -
Jan Esteban Santaeularia
@janestebans -
Lau
@LauG5e -
Ikkun | TECHFUND
@IkutaKatsumi -
Ellis Norman
@EllisJNorman1 -
Andrea
@andrealbiac -
Ioana
@ioanamarin_ -
Oscar
@piloniet
Something went wrong.
Something went wrong.