Adesh Kolte (@adeshkolte) 's Twitter Profile
Adesh Kolte

@adeshkolte

| Web3 Security @Zokyo_io | @synack Red Team Member |Ex @microsoft 's Top 100 Security Researcher List -2018| Opinions are my own.

ID: 1608038912

linkhttp://ad3.sh calendar_today20-07-2013 11:09:01

1,1K Tweet

949 Takipçi

2,2K Takip Edilen

Hari (@_hrkrshnn) 's Twitter Profile Photo

Crypto has many infrastructure projects, but nearly all struggle to find great developers to build them. Here are some thoughts after seeing what worked for Solidity, which is the infra projects with the most number of builders: 1. Are you building for your users rather than

Intigriti (@intigriti) 's Twitter Profile Photo

BugBountyHunting.com by payloadartist is a search engine to find new bug bounty write-ups, reports, and other web hacking learning materials! 🤠 🔗 bugbountyhunting.com

BugBountyHunting.com by <a href="/payloadartist/">payloadartist</a> is a search engine to find new bug bounty write-ups, reports, and other web hacking learning materials! 🤠

🔗 bugbountyhunting.com
r1ru (@ri5255) 's Twitter Profile Photo

I've started working on the 2025 edition of "Hacking: The Art of Exploitation", a beginner-friendly guide to binary exploitation. Wish me luck! r1ru.github.io/posts/8/

Intigriti (@intigriti) 's Twitter Profile Photo

In our technical post, we dive deeper into how you can spot more vulnerabilities in Firebase targets! Including more examples of testing for improper access controls and CORS misconfigurations. intigriti.com/researchers/bl…

zokyo (@zokyo_io) 's Twitter Profile Photo

$1M+ in Security Grants now available through security.xyz We’re proud to have been selected as one of the auditors on this new public-good platform. Create an account and submit your proposal. We’re ready when you are!

$1M+ in Security Grants now available through <a href="/security_xyz/">security.xyz</a>

We’re proud to have been selected as one of the auditors on this new public-good platform. 

Create an account and submit your proposal. We’re ready when you are!
Intigriti (@intigriti) 's Twitter Profile Photo

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠

In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎

🧵 👇
Abi (@abicodeintegrit) 's Twitter Profile Photo

We got Notion to leak your private Notion pages 💀 On Thursday Notion announced Notion 3.0 with support for custom agents using MCP (built by Anthropic) — powerful, but dangerous. Simon Willison calls these MCP related attacks the “lethal trifecta”: the combination of LLMs,

We got <a href="/NotionHQ/">Notion</a> to leak your private Notion pages 💀

On Thursday <a href="/NotionHQ/">Notion</a> announced Notion 3.0 with support for custom agents using MCP (built by <a href="/AnthropicAI/">Anthropic</a>) — powerful, but dangerous. 

<a href="/simonw/">Simon Willison</a> calls these MCP related attacks the “lethal trifecta”: the combination of LLMs,
Shieldify Security (@shieldifysec) 's Twitter Profile Photo

Repo with resources to build secure Solana programs. Includes: - rust basics ✅ - Anchor ✅ - handpick collection of numerous other handbooks and tips ✅ github.com/0xMacro/awesom…

shafu (@shafu0x) 's Twitter Profile Photo

Red flags to look for when applying to jobs in crypto - linkedin - don't use foundry - degree requirement - code challenge - anon team - more marketing than builders - unpaid "test work" - toxic twitter - empty github - don't take security seriously - shady funding history

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

Top 5 Underrated OpSec Tools for Blockchain Pros in 2025 🛡️ As a threat researcher, these saved me time & assets. 1) DeBank for multi-chain tracking. 2) BlockSec MetaSleuth for transaction graphs. 3) Delegate for security. 4) Obsidian for flow charts (organise

Ninja_Dev (@ninja_dev3) 's Twitter Profile Photo

Your subdomains are at risk of being compromised!🛑 Clean up those DNS records. Its very easy to have Subdomain Takeovers when you deprecate domains, apps, during testing, etc, and forget about them. WHY is this risky? If you have an outdated record you no longer use, anyone

Pandit | Ξ🦇🔊 (@panditdhamdhere) 's Twitter Profile Photo

ETHEREUM PROPOSES EIP-7791- A new mechanism to pay contract developers micro GAS REVENUE. EIP-7791 introduces a groundbreaking new opcode called GAS2ETH that enables smart contracts to directly convert gas into ETH. This proposal aims to fundamentally change how smart contract

ETHEREUM PROPOSES EIP-7791-  A new mechanism to pay contract developers micro GAS REVENUE.

EIP-7791 introduces a groundbreaking new opcode called GAS2ETH that enables smart contracts to directly convert gas into ETH.

This proposal aims to fundamentally change how smart contract
zokyo (@zokyo_io) 's Twitter Profile Photo

We built a fuzzing harness for Solana Vaults using Pinocchio and Honggfuzz. Learn how to uncover hidden bugs in on-chain logic (full PoC, setup walkthrough, and runnable example code). Big thanks to mahmoud for the write-up. 🔗 zokyo.io/blog/guide-to-…

We built a fuzzing harness for Solana Vaults using Pinocchio and Honggfuzz.

Learn how to uncover hidden bugs in on-chain logic (full PoC, setup walkthrough, and runnable example code).

Big thanks to <a href="/mahmoud89/">mahmoud</a> for the write-up.

🔗 zokyo.io/blog/guide-to-…
Sigma Prime (@sigp_io) 's Twitter Profile Photo

Staring at complex code and feeling like you're making no progress? You're not alone. Every developer hits this wall. The key isn't being smarter, it's having better strategies for breaking through complexity. Here's what actually works when code feels impossible to understand