
Security Pills - Issue 44
Java Exploitation Restrictions in Modern JDK Times, Meterpreter vs Modern EDRs, How to Bypass Cloudflare in 2023

Security Pills - Issue 43
Effective Active Subdomain Enumeration with Patterns, Hacking Play-To-Earn Blockchain Games, Rule Writing for CodeQL and Semgrep

Security Pills - Issue 42
The case for improving crypto wallet security, How to avoid the aCropalypse, Taking over any DNSSEC name on ENS

Security Pills - Issue 41
Fuel VM Binary Analysis, The curl quirk that exposed Burp Suite & Google Chrome, Decipher EVM Puzzles game

Security Pills - Issue 40
Five myths about formally verifying smart contracts, Exploring unconfirmed transactions for effective Bitcoin address clustering

Security Pills - Issue 39
Heuristics for smart contracts, Abusing HTTP Hop-by-hop headers, Bitcoin Address Clustering

Security Pills - Issue 38
The ABCs of Ethereum Virtual Machine, Overview of the Inflation Attack, Practical Introduction to CodeQL

Security Pills - Issue 37
Reusable properties for Ethereum contracts, GitHub Security Lab audited DataHub, Demystifying Exploitable Bugs in Smart Contracts

Security Pills - Issue 36
How BlockSec Rescued Stolen Funds, OWASP Kubernetes Top 10, Zero Transfer Phishing

Security Pills - Issue 35
Server-side prototype pollution, Entering the Huff ecosystem, RCE in your Azure Web Service
Security Pills /