Nome: | Smart Contract Hacking Course | Become A Hacker [FCO] |
Descrizione: Smart Contract Hacking Course | Become A Hacker [FCO] About Become A Hacker - Master the Most Demanded Skill in the industry STAND OUT ON THE JOB MARKET - HIGH SALARY - Junior Smart Contract Auditor: $50-$100/h - Senior Smart Contract Auditor: $300-$500/h Become a part of a small highly-qualified professional pool and make headhunters go crazy about you. Upon finishing the Smart Contract Hacking course and acquiring all the knowledge required to excel in the industry, 4-digit rewards become totally attainable, like for one of our students here! The finalization of the course will be fully validated with a special verifiable certificate, confirming the completion. This can be a powerful tool to showcase your newly acquired expertise to potential employers. Join the Smart Contract Hacking course and unlock access to exclusive internship and job opportunities in the leading Web3 Security companies. All-in-one go-to resource packed with - 320+ videos / 30+ hours / 40+ exercises. - High-quality content for you to build your skills. Have fun learning meanwhile accelerating your career and getting infinite opportunities. Hands-on packed course materials will allow you to instantly practice and right away start conquering the leaderboards in auditing contests. MASTER SMART CONTRACTS HACKING - Crazy Bug Bounties - The only thing that separates you and early retirement is gaining smart contract hacking skills and finding a vulnerability. - Earn up to $10,000,000 doing white hat hacking for Blockchain projects. Instructor(s): JohnnyTime, 12 years of real-world experience in cyber security and blockchains Owen, Smart contract auditing firm founder, blockchain security expert Media Information: MP4 | Video: h264, 1920x1080 | Audio: AAC, 48.000 KHz, 2 Ch Genre: eLearning | Language: English | Last updated: 12/2023 | Duration: 380 Lessons ( 39h 35m 13s ) | Author: JohnnyTime, Owen, 2 others! Source: https://smartcontractshacking.com/ | |
YouTube Video: | |
Categoria: | Tutorials |
Lingua: | English |
Dimensione totale: | 16.87 GB |
Info Hash: | B19AF8B80D920CD70F8E452CFAD4D0AA2DF04A5C |
Aggiunto di: | Prom3th3uS |
Data di aggiunta: | 2024-01-08 23:24:30 |
Stato torrent: | Torrent Verified by Prom3th3uS on 8th January, 2024 |
Rating: | Not Yet Rated (Log in to rate it) |
URL | Seeders | Leechers | Completato |
---|---|---|---|
udp://tracker.torrent.eu.org:451/announce | 25 | 22 | 83 |
udp://open.demonii.com:1337/announce | 0 | 0 | 0 |
udp://p4p.arenabg.com:1337/announce | 14 | 18 | 0 |
udp://tracker.tiny-vps.com:6969/announce | 5 | 13 | 7 |
udp://exodus.desync.com:6969/announce | 14 | 14 | 45 |
udp://explodie.org:6969/announce | 13 | 17 | 0 |
udp://tracker.opentrackr.org:1337/announce | 23 | 24 | 82 |
udp://movies.zsw.ca:6969/announce | 23 | 20 | 73 |
udp://tracker.dler.org:6969/announce | 3 | 3 | 1 |
udp://open.stealth.si:80/announce | 19 | 20 | 66 |
udp://tracker.openbittorrent.com:6969/announce | 5 | 3 | 10 |
udp://tracker.edkj.club:6969/announce | 12 | 18 | 3 |
udp://opentracker.i2p.rocks:6969/announce | 22 | 22 | 76 |
udp://6.pocketnet.app:6969/announce | 23 | 23 | 72 |
udp://free.publictracker.xyz:6969/announce | 6 | 10 | 3 |
File | Dimensione |
---|---|
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url | 377.00 B |
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url | 239.00 B |
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url | 290.00 B |
Smart Contract Hacking - Part 1/01. Introduction/1. Welcome.mp4 | 36.72 MB |
Smart Contract Hacking - Part 1/01. Introduction/2. Who is this for.mp4 | 39.86 MB |
Smart Contract Hacking - Part 1/01. Introduction/3. What is in it for you.mp4 | 15.34 MB |
Smart Contract Hacking - Part 1/01. Introduction/4. Course Contents.mp4 | 27.06 MB |
Smart Contract Hacking - Part 1/01. Introduction/5. Career Shift.mp4 | 13.77 MB |
Smart Contract Hacking - Part 1/01. Introduction/6. The Exercises.mp4 | 88.19 MB |
Smart Contract Hacking - Part 1/01. Introduction/7. Social Media Presence.mp4 | 40.10 MB |
Smart Contract Hacking - Part 1/01. Introduction/8. Copyright.mp4 | 16.94 MB |
Smart Contract Hacking - Part 1/02. Career Paths/1. Agenda.mp4 | 8.34 MB |
Smart Contract Hacking - Part 1/02. Career Paths/2. Auditing Firms.mp4 | 49.24 MB |
Smart Contract Hacking - Part 1/02. Career Paths/3. Private Audits and DAOs.mp4 | 26.71 MB |
Smart Contract Hacking - Part 1/02. Career Paths/4. Bug Bounties.mp4 | 36.65 MB |
Smart Contract Hacking - Part 1/02. Career Paths/5. Auditing Contests.mp4 | 55.05 MB |
Smart Contract Hacking - Part 1/02. Career Paths/6. Hands-On Time.mp4 | 20.94 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/1. Agenda.mp4 | 17.57 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/2. Our IDE.mp4 | 44.09 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/3. Hello Hardhat.mp4 | 68.89 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/4. Hardhat Commands.mp4 | 42.96 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/5. Metamask.mp4 | 49.68 MB |
Smart Contract Hacking - Part 1/03. DEV Tools/6. Summary.mp4 | 4.68 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/01. Agenda.mp4 | 11.25 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/02. Ethereum.mp4 | 39.97 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/03. Accounts in Ethereum.mp4 | 16.83 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/04. Transactions in Ethereum.mp4 | 24.97 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/05. EVM Components.mp4 | 14.65 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/06. Global Variables.mp4 | 8.08 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/07. Persistent Data.mp4 | 32.77 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/08. Volatile Data.mp4 | 29.00 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/09. Transaction Lifecycle.mp4 | 34.82 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/10. Smart Contract Calls.mp4 | 66.46 MB |
Smart Contract Hacking - Part 1/04. Intro to the EVM/11. Summary.mp4 | 14.50 MB |
Smart Contract Hacking - Part 1/05. Excersise Guideline/1. Exercise Guidelines.mp4 | 111.93 MB |
Smart Contract Hacking - Part 1/05. Excersise Guideline/1.1 sch-lite-exercises-main.zip | 1.77 MB |
Smart Contract Hacking - Part 1/05. Excersise Guideline/1.2 sch-lite-solutions-main.zip | 1.79 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/01. Agenda.mp4 | 16.30 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/02. What are fungible tokens.mp4 | 26.66 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/03. ERC20 standard.mp4 | 24.31 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/04. ERC20.sol Deep Dive.mp4 | 36.97 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/05. Built-in Functions.mp4 | 70.32 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/06. Extensions.mp4 | 27.34 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/07. Summary.mp4 | 14.20 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/08. Exercise 1 – Instructions.mp4 | 27.50 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/09. Exercise 1 – Solution.mp4 | 97.75 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/10. Exercise 2 – Instructions.mp4 | 39.81 MB |
Smart Contract Hacking - Part 1/06. Tokens Crash Course - Fungible Tokens/11. Exercise 2 – Solution.mp4 | 281.21 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/01. Agenda.mp4 | 18.36 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/02. NFTs.mp4 | 48.97 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/03. ERC721 Standard.mp4 | 8.35 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/04. ERC721.sol.mp4 | 30.17 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/05. Built-in Functions.mp4 | 160.17 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/06. Extensions.mp4 | 31.37 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/07. Summary.mp4 | 18.17 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/08. Exercise 1 - Instructions.mp4 | 32.10 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/09. Exercise 1 - Solution.mp4 | 134.74 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/10. Exercise 2 - Instructions.mp4 | 19.88 MB |
Smart Contract Hacking - Part 1/07. Tokens Crash Course - Non-Fungible Tokens/11. Exercise 2 - Solution.mp4 | 328.54 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/01. Agenda.mp4 | 8.39 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/02. Randomness Use Cases.mp4 | 16.88 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/03. The Problem.mp4 | 29.45 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/04. Example.mp4 | 10.84 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/05. The Solution.mp4 | 28.84 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/06. Summary.mp4 | 3.37 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/07. Exercise 1 - Instructions.mp4 | 2.83 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/08. Exercise 1 - Solution.mp4 | 43.19 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/09. Exercise 2 - Instructions.mp4 | 3.23 MB |
Smart Contract Hacking - Part 1/08. Randomness Vulnerabilities/10. Exercise 2 - Solution.mp4 | 86.76 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/01. Agenda.mp4 | 17.74 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/02. Integers in Solidity.mp4 | 41.59 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/03. Overflows and Underflows Explained.mp4 | 39.10 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/04. Examples.mp4 | 41.93 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/05. Why is it Dangerous.mp4 | 10.25 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/06. Avoiding Overflows and Underflows.mp4 | 35.01 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/07. Summary.mp4 | 13.44 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/08. Exercise 1 - Instructions.mp4 | 16.58 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/09. Exercise 1 - Solution.mp4 | 126.69 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/10. Exercise 2 - Instructions.mp4 | 6.03 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/11. Exercise 2 - Solution.mp4 | 59.48 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/12. Exercise 3 - Instructions.mp4 | 11.12 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/13. Exercise 3 - Solution.mp4 | 121.17 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/14. Exercise 4 - Instructions.mp4 | 4.39 MB |
Smart Contract Hacking - Part 1/09. Arithmetic Overflows and Underflows/15. Exercise 4 - Solution.mp4 | 97.63 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/1. Agenda.mp4 | 18.27 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/2. Wha are Phishing Attacks.mp4 | 44.35 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/3. Web2 Phishing Examples.mp4 | 22.56 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/4. Web3 Phishing Examples.mp4 | 49.09 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/5. Phishing with tx.origin.mp4 | 59.49 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/6. Summary.mp4 | 19.78 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/7. Exercise 1 - Instructions.mp4 | 9.75 MB |
Smart Contract Hacking - Part 1/10. Phishing Attacks/8. Exercise 1 - Solution.mp4 | 101.61 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/01. Agenda.mp4 | 17.20 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/02. Accounts in Ethereum.mp4 | 8.99 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/03. How Contracts Receive ETH.mp4 | 14.20 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/04. Reentrancy Explained.mp4 | 25.29 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/05. Simple Reentrancy.mp4 | 65.13 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/06. Advanced Reentrancy.mp4 | 39.41 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/07. Mitigating Reentrancy Attacks.mp4 | 46.38 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/08. Summary.mp4 | 26.53 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/09. Exercise 1 - Instructions.mp4 | 6.69 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/10. Exercise 1 - Solution.mp4 | 122.48 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/11. Exercise 2 - Instructions.mp4 | 9.05 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/12. Exercise 2 - Solution.mp4 | 209.67 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/13. Exercise 3 - Instructions.mp4 | 15.52 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/14. Exercise 3 - Solution.mp4 | 312.35 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/15. Exercise 4 - Instructions.mp4 | 12.03 MB |
Smart Contract Hacking - Part 1/11. Reentrancy Attacks/16. Exercise 4 - Solution.mp4 | 296.02 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/01. Agenda.mp4 | 17.00 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/02. Functions Visibility.mp4 | 16.44 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/03. Variables Visibility.mp4 | 9.11 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/04. Developers Make Mistakes.mp4 | 2.79 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/05. Default Visibility Vulnerabilities.mp4 | 15.22 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/06. Access Control Vulnerabilities.mp4 | 21.59 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/07. Mitigating Access Control Vulnerabilities.mp4 | 18.43 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/08. Access Control by OpenZeppelin.mp4 | 22.25 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/09. Summary.mp4 | 10.15 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/10. Exercise 1 - Instructions.mp4 | 3.10 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/11. Exercise 1 - Solution.mp4 | 32.32 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/12. Exercise 2 - Instructions.mp4 | 5.21 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/13. Exercise 2 - Solution.mp4 | 42.65 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/14. Exercise 3 - Instructions.mp4 | 4.76 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/15. Exercise 3 - Solution.mp4 | 86.58 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/16. Exercise 4 - Instructions.mp4 | 6.01 MB |
Smart Contract Hacking - Part 1/12. Access Control Vulnerabilities/17. Exercise 4 - Solution.mp4 | 68.08 MB |
Smart Contract Hacking - Part 1/FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url | 290.00 B |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/01. Intro.mp4 | 15.70 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/02. What are DEXes.mp4 | 31.23 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/03. DEXes Advantages.mp4 | 8.06 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/04. How DEXes Work.mp4 | 13.53 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/05. DEX Example - Uniswap.mp4 | 30.51 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/06. Automated Market Maker.mp4 | 38.09 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/07. Uniswap Architecture.mp4 | 18.91 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/08. Uniswap Contracts Factory.sol.mp4 | 11.92 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/09. Uniswap Contracts Router.sol.mp4 | 26.51 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/10. Uniswap Contracts Pair.sol.mp4 | 66.30 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/11. Summary.mp4 | 11.15 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/12. Exercise 1 - Instructions.mp4 | 40.86 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/13. Exercise 1 - Solution.mp4 | 336.89 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/14. Exercise 2 - Instructions.mp4 | 67.12 MB |
Smart Contract Hacking - Part 2/01. DEFI Crash Course - Decentralized Exchanges/15. Exercise 2 - Solution.mp4 | 344.06 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/01. Intro.mp4 | 30.47 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/02. Traditional Lending and Borrowing.mp4 | 12.44 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/03. What are Money Markets.mp4 | 51.11 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/04. Glossary.mp4 | 80.38 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/05. AAVE Overview.mp4 | 19.86 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/06. AAVE V3 Contracts Receipt Tokens.mp4 | 68.19 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/07. AAVE V3 Contracts Debt Tokens.mp4 | 11.08 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/08. AAVE V3 Contracts Pool.sol.mp4 | 23.35 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/09. AAVE Demo.mp4 | 77.36 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/10. Compound Overview.mp4 | 13.02 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/11. Compound Architecture and Contracts.mp4 | 51.64 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/12. Compound V2 Contracts cToken.sol.mp4 | 40.01 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/13. Compound V2 Contracts Comptroller.sol.mp4 | 9.21 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/14. Compound Demo.mp4 | 62.90 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/15. Guess the Fork.mp4 | 39.29 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/16. Summary.mp4 | 22.83 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/17. Exercise 1 - Instructions.mp4 | 25.53 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/18. Exercise 1 - Solution.mp4 | 265.30 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/19. Exercise 2 - Instructions.mp4 | 20.19 MB |
Smart Contract Hacking - Part 2/02. DEFI Crash Course - Money Markets/20. Exercise 2 - Solution.mp4 | 191.32 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/01. Intro.mp4 | 12.53 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/02. Symmetric Encryption.mp4 | 15.36 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/03. Asymmetric Encryption.mp4 | 12.15 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/04. Asymmetric Signing.mp4 | 10.59 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/05. How Crypto Wallets Work.mp4 | 24.29 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/06. Signing and Verifying Transactions.mp4 | 11.06 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/07. What Can We Sign.mp4 | 24.04 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/08. Signing and Verifying Data.mp4 | 46.99 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/09. Replay Attack Explained.mp4 | 29.37 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/10. Preventing Replay Attacks.mp4 | 11.09 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/11. EIP712 and ERC20 Permit.mp4 | 44.35 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/12. Summary.mp4 | 16.56 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/13. Exercise 1 - Instructions.mp4 | 9.20 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/14. Exercise 1 - Solution.mp4 | 146.98 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/15. Exercise 2 - Instructions.mp4 | 19.10 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/16. Exercise 2 - Solution.mp4 | 225.93 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/17. Exercise 3 - Instructions.mp4 | 17.05 MB |
Smart Contract Hacking - Part 2/03. Replay Attacks/18. Exercise 3 - Solution.mp4 | 173.25 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/01. Intro.mp4 | 17.06 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/02. Reminder - Money Markets.mp4 | 14.04 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/03. What Are Flash Loans.mp4 | 39.86 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/04. How Flash Loans Work.mp4 | 23.69 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/05. AAVE V3 Flash Loan.mp4 | 22.13 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/06. Reminder - Uniswap V2.mp4 | 15.07 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/07. Uniswap V2 Flash Setup.mp4 | 48.27 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/08. Summary.mp4 | 9.83 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/09. Exercise 1 - Instructions.mp4 | 20.94 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/10. Exercise 1 - Solution.mp4 | 99.47 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/11. Exercise 2 - Instructions.mp4 | 32.34 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/12. Exercise 2 - Solution.mp4 | 247.60 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/13. Exercise 3 - Instructions.mp4 | 11.42 MB |
Smart Contract Hacking - Part 2/04. Flash Loans and Flash Swaps/14. Exercise 3 - Solution.mp4 | 152.04 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/01. Intro.mp4 | 16.89 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/02. Reminder - Flash Loans.mp4 | 16.06 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/03. What Are Flash Loan Attacks.mp4 | 36.47 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/04. Exploiting Protocols Using Flash Loans.mp4 | 26.74 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/05. Preventing Flash Loan Attacks.mp4 | 28.96 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/06. Summary.mp4 | 7.99 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/07. Exercise Notes.mp4 | 23.50 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/08. Exercise 1 - Instructions.mp4 | 3.85 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/09. Exercise 1 - Solution.mp4 | 100.29 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/10. Exercise 2 - Instructions.mp4 | 4.47 MB |
Smart Contract Hacking - Part 2/05. Flash Loan Attacks/11. Exercise 2 - Solution.mp4 | 104.11 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/01. Intro.mp4 | 13.99 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/02. What is Denial of Service.mp4 | 28.87 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/03. DoS vs DDoS.mp4 | 15.63 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/04. Smart Contract DoS Attack.mp4 | 4.40 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/05. Dependent on Owner.mp4 | 24.59 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/06. Dependent on External Call.mp4 | 37.95 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/07. Dependent on External Data.mp4 | 29.04 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/08. DoS Using Gas Manipulations.mp4 | 43.91 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/09. Preventing DoS Attacks.mp4 | 10.35 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/10. Summary.mp4 | 5.85 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/11. Exercise 1 - Instructions.mp4 | 6.41 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/12. Exercise 1 - Solution.mp4 | 80.34 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/13. Exercise 2 - Instructions.mp4 | 7.45 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/14. Exercise 2 - Solution.mp4 | 70.83 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/15. Exercise 3 - Instructions.mp4 | 4.84 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/16. Exercise 3 - Solution.mp4 | 103.55 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/17. Exercise 4 - Instructions.mp4 | 8.14 MB |
Smart Contract Hacking - Part 2/06. DoS Attacks/18. Exercise 4 - Solution.mp4 | 158.56 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/01. Intro.mp4 | 19.91 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/02. All Blockchain Data is Public.mp4 | 11.84 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/03. EVM Storage Deep Dive.mp4 | 36.39 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/04. EVM Storage Challenge.mp4 | 13.07 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/05. On-Chain Examples.mp4 | 8.39 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/06. Transactions Analysis.mp4 | 24.58 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/07. Hello. CAST.mp4 | 27.54 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/08. Summary.mp4 | 30.11 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/09. Exercise 1 - Instructions.mp4 | 13.98 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/10. Exercise 1 - Solution.mp4 | 242.41 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/11. Exercise 2 - Instructions.mp4 | 18.42 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/12. Exercise 2 - Solution.mp4 | 120.03 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/13. Exercise 3 - Instructions.mp4 | 25.88 MB |
Smart Contract Hacking - Part 2/07. Sensitive On-Chain Data/14. Exercise 3 - Solution.mp4 | 241.87 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/01. Intro.mp4 | 19.12 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/02. Reminder - Smart Contract Calls.mp4 | 20.88 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/03. The Problem.mp4 | 18.50 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/04. High-Level Calls.mp4 | 8.19 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/05. High-Level Internal Calls.mp4 | 3.81 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/06. transfer() Opcode.mp4 | 12.13 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/07. High-Level External Calls.mp4 | 37.36 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/08. SafeERC20.mp4 | 16.57 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/09. Low-Level Calls.mp4 | 11.81 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/10. send() Opcode.mp4 | 19.41 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/11. call() Opcode.mp4 | 15.01 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/12. High-Level vs Low-Level Calls.mp4 | 27.08 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/13. Summary.mp4 | 11.16 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/14. Exercise 1 - Instructions.mp4 | 19.59 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/15. Exercise 1 - Solution.mp4 | 136.17 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/16. Exercise 2 - Instructions.mp4 | 12.90 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/17. Exercise 2 - Solution.mp4 | 251.55 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/18. Exercise 3 - Instructions.mp4 | 8.19 MB |
Smart Contract Hacking - Part 2/08. Unchecked Returns/19. Exercise 3 - Solution.mp4 | 187.08 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/01. Intro.mp4 | 17.53 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/02. Frontrunning Explained.mp4 | 56.84 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/03. Frontrunning in Web3.mp4 | 4.77 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/04. Mempool Explained.mp4 | 15.86 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/05. Bots are Everywhere.mp4 | 55.48 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/06. Why is Frontrunning Important.mp4 | 13.01 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/07. Frontrunning Examples.mp4 | 7.24 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/08. Sandwich Attack Explained.mp4 | 30.72 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/09. Vulnerable Contracts.mp4 | 21.99 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/10. Summary.mp4 | 10.83 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/11. Exercise Notes.mp4 | 27.89 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/12. Exercise 1 - Instructions.mp4 | 11.76 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/13. Exercise 1 - Solution.mp4 | 120.74 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/14. Exercise 2 - Instructions.mp4 | 7.86 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/15. Exercise 2 - Solution.mp4 | 98.61 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/16. Exercise 3 - Instructions.mp4 | 11.44 MB |
Smart Contract Hacking - Part 2/09. Frontrunning/17. Exercise 3 - Solution.mp4 | 237.22 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/01. Intro.mp4 | 16.81 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/02. DAO Explained.mp4 | 25.11 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/03. DAO Assets.mp4 | 27.87 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/04. DAO Operations.mp4 | 11.06 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/05. DAO Examples - Nouns DAO.mp4 | 28.22 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/06. DAO Examples - Illuvium DAO.mp4 | 19.39 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/07. DAO Examples - PancakeSwap DAO.mp4 | 24.12 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/08. DAO Examples - Olympus DAO.mp4 | 9.53 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/09. Attacking DAOs.mp4 | 22.04 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/10. Summary.mp4 | 15.36 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/11. Beanstalk Hack Case Study.mp4 | 142.20 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/12. Exercise 1 - Instructions.mp4 | 8.85 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/13. Exercise 1 - Solution.mp4 | 101.97 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/14. Exercise 2 - Instructions.mp4 | 13.57 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/15. Exercise 2 - Solution.mp4 | 171.91 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/16. Exercise 3 - Instructions.mp4 | 15.21 MB |
Smart Contract Hacking - Part 2/10. DAO and Governance Attacks/17. Exercise 3 - Solution.mp4 | 202.29 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/01. Intro.mp4 | 11.18 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/02. The Need for Oracles.mp4 | 13.36 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/03. What is an Oracle.mp4 | 3.67 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/04. Oracles Use Cases.mp4 | 12.35 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/05. Synthetic Assets.mp4 | 8.71 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/06. Lending Protocols.mp4 | 12.04 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/07. Maker DAO.mp4 | 39.78 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/08. Oracle Types.mp4 | 15.10 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/09. Off-Chain Centralized Oracles.mp4 | 70.12 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/10. Off-Chain Decentralized Oracles - Chainlink.mp4 | 45.03 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/11. Off-Chain Oracles.mp4 | 4.59 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/12. Exploiting On-Chain Oracles.mp4 | 50.77 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/13. Uniswap TWAP.mp4 | 29.40 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/14. Oracles Attack Bectors.mp4 | 36.95 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/15. Synthetix Case Study.mp4 | 28.41 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/16. Best Practices.mp4 | 11.26 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/17. Summary.mp4 | 15.13 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/18. Exercise 1 - Instructions.mp4 | 8.83 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/19. Exercise 1 - Solution.mp4 | 214.36 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/20. Exercise 2 - Instructions.mp4 | 11.25 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/21. Exercise 2 - Solution.mp4 | 314.05 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/22. Exercise 3 - Instructions.mp4 | 12.55 MB |
Smart Contract Hacking - Part 2/11. Oracle Manipulation/23. Exercise 3 - Solution.mp4 | 567.18 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/01. Intro.mp4 | 33.21 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/02. call() Opcode.mp4 | 15.54 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/03. call() Usecases.mp4 | 15.03 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/04. Call Attacks.mp4 | 79.48 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/05. delegatecall() Opcode.mp4 | 15.90 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/06. delegatecall() Usecases.mp4 | 20.64 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/07. Proxy Contracts.mp4 | 41.76 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/08. Clones and Minimal Proxies.mp4 | 61.27 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/09. Upgradeable Proxies.mp4 | 57.57 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/10. Proxies Issues.mp4 | 37.48 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/11. Storage Collisions.mp4 | 44.49 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/12. Summary.mp4 | 60.45 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/13. Exercise 1 - Instructions.mp4 | 7.10 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/14. Exercise 1 - Solution.mp4 | 92.75 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/15. Exercise 2 - Instructions.mp4 | 8.71 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/16. Exercise 2 - Solution.mp4 | 257.92 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/17. Exercise 3 - Instructions.mp4 | 10.73 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/18. Exercise 3 - Solution.mp4 | 219.55 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/19. Exercise 4 - Instructions.mp4 | 4.93 MB |
Smart Contract Hacking - Part 2/12. Call Attacks/20. Exercise 4 - Solution.mp4 | 156.10 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/1. What Defines a Good Auditor.mp4 | 2.61 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/2. Top Level Overview.mp4 | 1.54 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/3. The Invisible State Machine.mp4 | 6.19 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/4. Auditing Approach.mp4 | 5.53 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/5. Differential Auditing.mp4 | 2.62 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/6. Soft Spots.mp4 | 8.26 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/7. Off Keyboard Methodology.mp4 | 2.18 MB |
Smart Contract Hacking - Part 2/13. Auditing Methodology by Trust/8. How to Improve.mp4 | 4.73 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/1. Intro.mp4 | 3.66 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/2. What is Oak Security.mp4 | 4.41 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/3. What is Spearbit DAO.mp4 | 2.63 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/4. How to Crush the Interview.mp4 | 21.67 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/5. Insider Tips.mp4 | 12.89 MB |
Smart Contract Hacking - Part 2/14. Auditing DAOs 101 by Pashov/6. How to Get Promoted.mp4 | 24.98 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/1. Intro.mp4 | 41.76 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/2. Have a Goal Set.mp4 | 21.46 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/3. Deal With the Pain Now.mp4 | 26.34 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/4. Track Your Work Religiously.mp4 | 25.72 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/5. Join a Community.mp4 | 24.75 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/6. Live Below Your Means.mp4 | 19.68 MB |
Smart Contract Hacking - Part 2/15. Transitioning to Web3 Security by Owen/7. Summary.mp4 | 14.86 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/1. Intro.mp4 | 8.33 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/2. Payout Scheme.mp4 | 2.64 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/3. Auditing Contests - Advantages and Disadvantages.mp4 | 5.87 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/4. How to Improve Quickly.mp4 | 2.31 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/5. Code4rena Judge Inside Tips.mp4 | 14.90 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/6. Dos and Dont's.mp4 | 3.51 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/7. How to Top the Leaderboard.mp4 | 1.34 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/8. Making the Most of Backstage.mp4 | 2.64 MB |
Smart Contract Hacking - Part 2/16. How to Crush Auditing Contents by Trust/9. Know your Competition.mp4 | 3.06 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/1. Intro.mp4 | 5.72 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/2. What is Private Auditing.mp4 | 6.16 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/3. Marketing and Branding.mp4 | 15.24 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/4. Sales.mp4 | 8.43 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/5. Providing the Best Service.mp4 | 7.74 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/6. Required Technical Skills.mp4 | 12.13 MB |
Smart Contract Hacking - Part 2/17. Get Fully Booked as a Private Auditor by Pashov/7. End Result.mp4 | 8.29 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/01. Intro.mp4 | 9.52 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/02. What are Yield Optimizers.mp4 | 31.05 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/03. Beefy Finance Explained.mp4 | 28.34 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/04. How Does Auto Compound Happen.mp4 | 38.13 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/05. The Vault Code.mp4 | 48.10 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/06. The Withdrawal Fee.mp4 | 46.68 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/07. Vault Attack Example.mp4 | 22.50 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/08. Exercises Instructions.mp4 | 11.24 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/09. Exercise 1 - Solution.mp4 | 61.95 MB |
Smart Contract Hacking - Part 2/18. Yield Optimizers by Owen/10. Exercise 2 - Solution.mp4 | 50.38 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/1. Intro.mp4 | 11.55 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/2. 63 or 64 Rule.mp4 | 30.34 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/3. What is Gas Griefing.mp4 | 21.24 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/4. Optimism Contest Vulnerability Example.mp4 | 43.30 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/5. Having a Gas Limit.mp4 | 21.44 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/6. Exercise 1 - Instructions.mp4 | 9.23 MB |
Smart Contract Hacking - Part 2/19. Advanced Gas Griefing Attacks by Owen/7. Exercise 1 - Solution.mp4 | 133.81 MB |
Smart Contract Hacking - Part 2/FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url | 290.00 B |
Support Us.txt | 185.00 B |