Under the Hood of Solana Transactions: From PoH to BPF ExecutionWelcome back! If you read my last article on Solana’s Proof of History (PoH), you know PoH is like the backstage manager, ensuring…Nov 5Nov 5
Exploring Solana’s Consensus- What Makes Proof of Stake and Proof of History So Fast?If you’re curious about what makes Solana stand out in the blockchain world, you’re not alone. Honestly, when I first dug into it, I was…Nov 1Nov 1
Huff vs Yul: Mastering EVM Storage Optimization for Gas EfficiencyWhen optimizing Ethereum Virtual Machine (EVM) storage and gas efficiency, two low-level programming languages are like the Batman and…Sep 28Sep 28
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 3)Welcome back to the final chapter of our Ethereum Virtual Machine (EVM) deep dive. So far, we’ve explored Part 1 and Part 2, how the EVM…Sep 23Sep 23
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 2)In the first part of this series, we explored the key differences between Ethereum’s Virtual Machine (EVM) and traditional operating…Sep 11Sep 11
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 1)In the world of decentralized finance (DeFi), understanding how Ethereum’s virtual machine (EVM) compares to traditional operating systems…Sep 7Sep 7
XXE, how did a feature become a critical vulnerability?This is my take on XML External Entities and how a feature of this front-end language intrigued the security researchers and how it was…Oct 25, 2021Oct 25, 2021
CSRF to Account Takeover, the conceptual way of bug chaining.This is my take on CSRF and how to understand and chain them with different bugs when you are just starting in the Web Application…Oct 14, 20211Oct 14, 20211
Finding IDORs, the conceptual wayThis is my take on IDORs and how to understand them when you are just starting in the Web Application Penetration Testing.Oct 13, 20211Oct 13, 20211