Skip to content

Instantly share code, notes, and snippets.

View toufik-airane's full-sized avatar

Toufik Airane toufik-airane

View GitHub Profile
@toufik-airane
toufik-airane / gist:c1c57633645105a16fc68b5e04a58f62
Created April 23, 2024 07:03
Smart contract vulnerabilities
Reentrancy
Front-running
Integer overflow/underflow
Denial-of-Service (DoS)
Solidity-specific vulnerabilities
Uninitialized storage pointers
Unchecked external calls
Access control issues
Ether withdrawal issues
Transaction-ordering dependence (TOD)
This file has been truncated, but you can view the full file.
{"43ea0313": ["setRitualFee(uint256)"], "270d13fb": ["isCoinIdUnique(uint16)"], "aec77b63": ["returnTokensInPool(address[],uint256[])"], "2442cfec": ["putBtoWithStc(uint256,uint256,bytes32,uint256,uint256,uint256,uint256,bytes32,bytes32,uint8)"], "010afc20": ["claimWrappedContractAdmin()"], "6165234c": ["setPermissions(address,bool)"], "cd63d930": ["distributionCap()"], "2302c948": ["EtherDank()"], "b0dc63eb": ["startWineryProductByRegulator(string,string,string,string,int256)"], "ad62bda5": ["setRoundLength(uint32)"], "03976b0e": ["setBattleProviderAddress(address,address)"], "bb11ed7e": ["rescueTokensInMultiplePolls(uint256[])"], "d82ce857": ["getPI_edit_26()"], "f0adda7d": ["setNextVersionAddress(address)"], "17753c44": ["DIGTREX()"], "6d78a434": ["IntegrativeWalletToken(uint256,uint256,uint256,address)"], "f5da16e9": ["RECHToken()"], "12192b00": ["getInitialHP(uint64,uint64,uint64)"], "71e3fdc4": ["moveMintTokens(address,address,uint256)"], "9304ddc8": ["setUnitCreationFee(uint256)"], "5142ba74": ["rollov
A Casino Odyssey in Cyberspace
Originally Published
Mon May 19, 2003 at 09:31:12 AM EST
I had my first wet dream when I was fourteen, and two days later I was approached by the Avatar. Some parents try to interfere but mine had learned the first time, with my brother, who is nearly a century older than me. I knew they had noticed the stained bedclothes because they suddenly became a bit distant and started leaving me alone a lot. I thought they were trying to figure out how to have That Talk with me. Like most adolescents I knew something about sex years before my body was ready.
And like most adolescents I didn't know nearly as much as I thought I did. They were actually leaving the coast clear so Prime Intellect could do its explaining.
So like everybody of a certain age I found out that I could go anywhere, do anything, even go places I'd never imagined and do things that were utterly unbelievable. I could become a totally different person if I wanted to, taller or stronger or I could even become a girl.
It can also be argued that DNA is nothing more than a program designed to preserve itself. Life has become more complex in the overwhelming sea of information. And life, when organized into species, relies upon genes to be its memory system. So man is an individual only because of his own undefinable memory. But memory cannot be defined, yet it defines mankind. The advent of computers and the subsequent accumulation of incalculable data has given rise to a new system of memory and thought, parallel to your own. Humanity has underestimated the consequences of computerization.
Ghost in the shell
@toufik-airane
toufik-airane / CreateSelfdestruct.sol
Created May 25, 2023 23:52 — forked from MerlinEgalite/CreateSelfdestruct.sol
Tornado Cash Governance Hack
pragma solidity >=0.8.0;
import "forge-std/Test.sol";
import "forge-std/console2.sol";
contract ContractA {
function destroy() public {
selfdestruct(payable(0));
}
### Keybase proof
I hereby claim:
* I am toufik-airane on github.
* I am appsectribe (https://keybase.io/appsectribe) on keybase.
* I have a public key ASBtK6js-df23vPnz7jKc-FmQuEQB4udF2i56TK42EhbEQo
To claim this, I am signing this object:
@toufik-airane
toufik-airane / post-mortem.md
Created September 14, 2021 09:19
Post-mortem Template

Incident Postmortem Template

Clear documentation is key to an effective incident postmortem process. Many teams use a comprehensive template to collect consistent details during each postmortem review. Below is an example of an incident postmortem template, based on the postmortem outlined in our Incident Handbook. You can cut and paste these for documenting your own postmortems.

Incident summary

Write a summary of the incident in a few sentences. Include what happened, why, the severity of the incident and how long the impact lasted.

Leadup

Hello
I'm writing this to all the world, so you'll know more about us..
At first I want to give some points, so you'll be sure I'm the hacker:
I hacked Comodo from InstantSSL.it, their CEO's e-mail address mfpenco@mfpenco.com
Their Comodo username/password was: user: gtadmin password: globaltrust
Their DB name was: globaltrust and instantsslcms
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Happy new year!
Welcome to solarleaks.net (mirror: 5bpasg2kotxllmzsv6swwydbojnfuvfb7d6363pwe5wrzhjyn2ptvdqd.onion)
We are putting data found during our recent adventure for sale.
[Microsoft Windows (partial) source code and various Microsoft repositories]
price: 600,000 USD
python3 -c 'import pty; pty.spawn("/bin/bash")'
export TERM=xterm