Joran Honig
Search
Search
Search
Dark mode
Light mode
Explorer
⚔️ Quests
⚔️ Quest - The Basics of DeFi
🛣️ Path - The Ultimate Path to DeFi security research
Path Quest - A Crashcourse in Economics
Path Quest - The Attacker Mindset
🌱 seeds
Assurance Contract
Attacker Mindset
Bounty Hunting with Indicators
Bug Hunting from the Terminal
Competitive Audit Economics
Dominant Assurance Contract
Effort Budgeting
Generation Effect
Hydroponics
Jubensha
Minimalistic Software
Myerson-Satterthwaite theorem
Offensive AI
RLHF
Rogue public key attack
Smart Contract Security and AI
solar punk
Structure and Interpretation of Computer Programs
🌿 saplings
digital garden
blog
3 Activities to Make You a Better Bug Hunter
3 Mistakes I Made When I Started Bounty Hunting
3 Reasons Why You Should Publish Your Security Research
3 strategies to get into hunting bugs in smart contracts
3 Ways to Write a Proof of Concept
4 Strategies for picking the perfect bounty hunting targets
A Perfect Balance Between Practice and Execution.
Becoming a web 3 security researcher: Balancing foundations and the attacker mindset.
Bounties & Two Sided Reputation
Decoding the Y Combinator: A Deep Dive into Recursion
Don't Ignore Oracle Extractable Value!
Game Theory - Exploiting Superior Knowledge
Getting familiar with systems thinking, modelling and cadCAD
Hunting For Bugs: Top Idea in Your Mind
Introduction into Mutation Testing
Moving to a digital garden
Mutation Testing for Smart Contracts - A step by step guide
Parse Solidity incrementally using tree-sitter
Properties vs Fuzz tests
Security Analysis - Diving into Dataflow Analysis and Reaching Definitions
Shift Left and DevSecOps - What does it even mean?
SirenMarkets V1 - Getting Free Leverage with a Block Stuffing Attack
Sleuthing Toolbox - Everything you need to reverse engineer web3 hacks!
Stealing all your secrets using IPFS Mounts
Ultimate list of Common DeFi Component Types
You Should Look for Game Theory Bugs
note
aeropress
Bug Bounty Discussions - Moving the goalposts
cultivation
elo rating system
Goblins - Object Programming
halstead volume
Hanlon's razor
ranking system
trueskill
vim
Blockchain Bug Write-ups
blogs I like
Home
❯
blog
Folder: blog
26 items under this folder.
Mar 11, 2024
Becoming a web 3 security researcher: Balancing foundations and the attacker mindset.
Mar 09, 2024
Moving to a digital garden
#blog
#seed
#sapling
#fruit
Mar 05, 2024
Stealing all your secrets using IPFS Mounts
#vulnerability
Mar 05, 2024
Bounties & Two Sided Reputation
Mar 05, 2024
3 strategies to get into hunting bugs in smart contracts
#social-blog
Mar 05, 2024
4 Strategies for picking the perfect bounty hunting targets
#bug-bounty
Mar 05, 2024
Hunting For Bugs: Top Idea in Your Mind
#social-blog
#bug-bounty
Mar 05, 2024
3 Activities to Make You a Better Bug Hunter
#social-blog
Mar 05, 2024
A Perfect Balance Between Practice and Execution.
#social-blog
Mar 05, 2024
Don't Ignore Oracle Extractable Value!
#social-blog
Mar 05, 2024
3 Reasons Why You Should Publish Your Security Research
#social-blog
Mar 05, 2024
You Should Look for Game Theory Bugs
#social-blog
Mar 05, 2024
Properties vs Fuzz tests
Mar 05, 2024
Game Theory - Exploiting Superior Knowledge
Mar 05, 2024
3 Mistakes I Made When I Started Bounty Hunting
#social-blog
#bug-bounty
Mar 05, 2024
SirenMarkets V1 - Getting Free Leverage with a Block Stuffing Attack
#bug-bounty
#ethereum
#vulnerability
Mar 05, 2024
3 Ways to Write a Proof of Concept
#social-blog
Mar 05, 2024
Decoding the Y Combinator: A Deep Dive into Recursion
#functional-programming
Mar 05, 2024
Sleuthing Toolbox - Everything you need to reverse engineer web3 hacks!
Mar 05, 2024
Ultimate list of Common DeFi Component Types
Mar 05, 2024
Getting familiar with systems thinking, modelling and cadCAD
#systems-thinking
Mar 05, 2024
Parse Solidity incrementally using tree-sitter
#tree-sitter
#parsing
#solidity,
Mar 05, 2024
Introduction into Mutation Testing
#mutation-testing
Mar 05, 2024
Mutation Testing for Smart Contracts - A step by step guide
#mutation-testing
#ethereum
Mar 05, 2024
Shift Left and DevSecOps - What does it even mean?
#devsecops
Mar 05, 2024
Security Analysis - Diving into Dataflow Analysis and Reaching Definitions
#static-analysis
#security-analysis
#intro-to-security-analysis-techniques,