Ulaş Anıl (@_ulasanil) 's Twitter Profile
Ulaş Anıl

@_ulasanil

Smart Contract Auditor @nethermindsec + appsec enjoyer ex @Bugcrowd @rootstock_io

ID: 3429651431

linkhttp://ulasec.netlify.app calendar_today18-08-2015 10:14:36

158 Tweet

506 Followers

465 Following

Dinesh Shetty (@din3zh) 's Twitter Profile Photo

Five part blog series on Advanced Frida Frida usage by team at 8kSec Part 1 - 8ksec.io/advanced-frida… Part 2 - 8ksec.io/advanced-frida… Part 3 - 8ksec.io/advanced-frida… Part 4 - 8ksec.io/advanced-frida… Part 5 - 8ksec.io/advanced-root-… #MobileSecurity #AndroidSecurity

Five part blog series on Advanced Frida <a href="/fridadotre/">Frida</a> usage by team at <a href="/8kSec/">8kSec</a> 
Part 1 - 8ksec.io/advanced-frida…
Part 2 - 8ksec.io/advanced-frida…
Part 3 - 8ksec.io/advanced-frida…
Part 4 - 8ksec.io/advanced-frida…
Part 5 - 8ksec.io/advanced-root-…
#MobileSecurity #AndroidSecurity
Cantina 🪐 (@cantinaxyz) 's Twitter Profile Photo

Welcome to the largest competition in history with... @Blast_L2 🪐 💰 $1,200,000 USDC 🗓️ January 30th, 3:00 PM EST / 20:00 PM UTC 📍 cantina.xyz/competitions Invite only. Don't have one? Details below:

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

In case you missed it...I wrote a book, please support my work by buying a copy. If you've already bought one thank you, please can you RT to spread the word! leanpub.com/javascriptforh…

MiloTruck (@milotruck) 's Twitter Profile Photo

Please come solve my CTF challenges, they're pretty simple Most of them are based off bugs I've seen in real audits ctfd.nusgreyhats.org

Please come solve my CTF challenges, they're pretty simple

Most of them are based off bugs I've seen in real audits

ctfd.nusgreyhats.org
Remedy (@xyz_remedy) 's Twitter Profile Photo

🎉 Congrats to GLD-0 contest winners! $1400 prize pool is shared by 3 talented hunters: 🥇 Ulaş Anıl 🥈 YowiSec 🥉 Yakupov Vad Thanks to everyone who participated! Your skills shone bright🌟 More contests soon😉

🎉 Congrats to GLD-0 contest winners!
$1400 prize pool is shared by 3 talented hunters:

🥇 <a href="/_ulasanil/">Ulaş Anıl</a>
🥈 <a href="/YowiSec/">YowiSec</a>  
🥉 <a href="/TheMrArmbull/">Yakupov Vad</a> 

Thanks to everyone who participated! Your skills shone bright🌟 More contests soon😉
cmichel (@cmichelio) 's Twitter Profile Photo

Your oracle has 11 price sources and takes the median. How many sources must you manipulate for the median to change? If the prices are all close to each other it should be 6, not 5. There's more to it: The oracle used is the `sUSDePriceProviderBUniCatch`. It takes 11 sources - 1

Your oracle has 11 price sources and takes the median. How many sources must you manipulate for the median to change? If the prices are all close to each other it should be 6, not 5. There's more to it:
The oracle used is the `sUSDePriceProviderBUniCatch`. It takes 11 sources
- 1
Daniel Von Fange (@danielvf) 's Twitter Profile Photo

Here's how CertiK's 3 million dollar hack on Kracken worked. The core trick is that the overall blockchain transaction must succeed in order for the reverted deposit to count. So the attacker raw external called their own contract and ignored their own later revert. 1/n

Here's how CertiK's 3 million dollar hack on Kracken worked.

The core trick is that the overall blockchain transaction must succeed in order for the reverted deposit to count. So the attacker raw external called their own contract and ignored their own later revert. 1/n
ljj (@ljjeth) 's Twitter Profile Photo

Seems it has became kind of a meme being first place in the latest vVv contest so here is my first place too 😁

Seems it has became kind of a meme being first place in the latest vVv contest so here is my first place too 😁
Lefteris Karapetsas (@lefterisjp) 's Twitter Profile Photo

Every time an Ethereum hard fork rolls out smoothly, I’m in awe. So many EIPs, engineering work and yet not even a single hiccup. It’s a testament to the tireless, global effort of Ethereum core devs. They make hard forks boring, and that’s exactly how it should be. Thank you.

RareSkills (@rareskills_io) 's Twitter Profile Photo

New blog post is up: Multiplicative Subgroups and Primitive Elements Multiplicative subgroups are a foundational mechanic used in ZK algorithms like PLONK and ZK-STARKs as well as FFT. This article is the first in the series. This is not just another mathy treatment of the

Ulaş Anıl (@_ulasanil) 's Twitter Profile Photo

Just got a confirmed bug on Immunefi immunefi.com/s/ss/?severity… BUT..It wasn't a smooth ride. Not at all. Constantly got ignored by Immunefi. Questions were left unanswered. Mediation was concluded with 0 explanation to me. Not a good start for me. Hope the next one will be better.

Pierre (@pldespaigne) 's Twitter Profile Photo

On June 24th, I saw Ulaş Anıl’s tweet and reported it on our internal Slack. Five weeks later: it was classified as critical and awarded $150K. Don’t lose faith, sometimes it takes a while, but it’s worth it! x.com/immunefi/statu…

On June 24th, I saw <a href="/_ulasanil/">Ulaş Anıl</a>’s tweet and reported it on our internal Slack.

Five weeks later: it was classified as critical and awarded $150K.

Don’t lose faith, sometimes it takes a while, but it’s worth it!

x.com/immunefi/statu…
Nethermind Security (@nethermindsec) 's Twitter Profile Photo

Congratulations to Ulaş Anıl, one of our expert auditors, for earning a $150,000 bug bounty for a critical vulnerability report on Immunefi. Our team lives and breathes security. This kind of work happens behind the scenes every day through audits, deep research, and