Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
Disclaimer: All information (tools, links, articles, text, images, etc.) is provided for educational purposes only! All information is also based on data from public sources. You are solely responsible for your actions, not the author! Follow InfoSec and OpSec guidelines and perform all of your research on a separate, secure device!
Section | Link |
---|---|
Tools List | Explore |
VR & 3D Tools List | Explore |
Monero | Explore |
Knowledge Hub | Explore |
Follow List | Explore |
Support Project | Explore |
A Walkthrough by officercia.eth | Explore |
In this article I will tell you exactly how I investigate crypto hacks and security incidents, and describe methodology!
Data-Analysis:
Visualization:
Clusterizers:
Specific:
Hacks DBs
| Special Author's Notes:
| Articles:
Support is very important to me, with it I can spend less time at work and do what I love - educating DeFi & Crypto users :sparkling_heart:
If you want to support my work, please consider donating me to the address:
0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A — ERC20 & ETH officercia.eth
4AhpUrDtfVSWZMJcRMJkZoPwDSdVG6puYBE3ajQABQo6T533cVvx5vJRc5fX7sktJe67mXu1CcDmr7orn1CrGrqsT3ptfds - Monero XMR
You can also send me a donation to the address from this repository!
Check out as well:
Thank you! 🙏