Mrima (@kvltbyte) 's Twitter Profile
Mrima

@kvltbyte

Security @41swara | Metalhead

ID: 1352736939233914880

calendar_today22-01-2021 21:56:42

260 Tweet

556 Followers

347 Following

FORKFORK DOG (@forkforkdog) 's Twitter Profile Photo

This is how we are building universal fuzzing suits that runs in both foundry and echidna. Dizzy has extensive repo simplied for starters.

This is how we are building universal fuzzing suits that runs in both foundry and echidna. Dizzy has extensive repo simplied for starters.
Bright Mawudor,PhD (@brightzeed) 's Twitter Profile Photo

This month's Africahackon254 Official Meet Up will be a #Masterclass We shall be looking into Threat Intelligence from a #cyber criminals perspective, what it takes to be an analyst and also Blockchain security & Intelligence basics. Tickets: bit.ly/AHfebmeetup2025

This month's <a href="/africahackon254/">Africahackon254 Official</a> Meet Up will be a #Masterclass
We shall be looking into Threat Intelligence from a #cyber criminals perspective, what it takes to be an analyst and also Blockchain security &amp; Intelligence basics.
Tickets: bit.ly/AHfebmeetup2025
Bright Mawudor,PhD (@brightzeed) 's Twitter Profile Photo

My fellow presenters will be the SOC Ninja Wole from CyberSOC Africa and #Blockchain security researcher Mrima from 41swara . Looking forward to a very interactive session. Do come with your laptops.

My fellow presenters will be the SOC Ninja Wole from <a href="/Cybersocafrica/">CyberSOC Africa</a>  and #Blockchain security researcher <a href="/kvltbyte/">Mrima</a> from <a href="/41swara/">41swara</a> .
Looking forward to a very interactive session. Do come with your laptops.
David | crypto/acc (@dhkleung) 's Twitter Profile Photo

Now that we know who's behind the Bybit attack. Let's look at how the hack actually worked. At a high level, the hack involved the 4 broad group of events: 1. Attacker deployed a trojan contract and a backdoor contract. 2. Attacker tricked signers of the upgradeable

Now that we know who's behind the <a href="/Bybit_Official/">Bybit</a> attack. Let's look at how the hack actually worked.

At a high level, the hack involved the 4 broad group of events:

1. Attacker deployed a trojan contract and a backdoor contract.

2. Attacker tricked signers of the upgradeable
Spearbit (@spearbit) 's Twitter Profile Photo

Earlier today, Bybit got exploited for $1.46B. It's the biggest exploit in Web3 as of the time of writing, and seems to heavily point to an attack vector used in previous known exploits as well. We believe it's a combination of poorly managed opsec and access management that led

Mrima (@kvltbyte) 's Twitter Profile Photo

Bybit hacker tricked multisig signers to sign a transaction that upgrades the safe smart contract to a malicious implementation and drained all the funds: 1. easy to shoot yourself in the foot with upgradable contracts. 2. multisigs aren't bulletproof, you need better opsec!

H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

Breaking Update on the ByBit Hack 🚨🚨🚨🚨 It has been confirmed that the Lazarus Group compromised Safe{Wallet}’s AWS S3 bucket and injected malicious javascript code that resulted in a $1,400,000,000 loss. If you report this to Safe, you might get a $500 bounty.

Breaking Update on the ByBit Hack 🚨🚨🚨🚨

It has been confirmed that the Lazarus Group compromised Safe{Wallet}’s AWS S3 bucket and injected malicious javascript code that resulted in a $1,400,000,000  loss. 

If you report this to Safe, you might get a $500 bounty.
Is Now on VT! (@now_on_vt) 's Twitter Profile Photo

Sample is now on VT! 🚩Hash: fbd5e3eb17ef62f2ecf7890108a3af9bcc229aaa51820a6e5ec08a56864d864d 🎯Actor name: Lazarus 🔹Comment: The Safe{Wallet} JavaScript used by Lazarus in the ByBit hack that was deployed Feb 19, 2025 17:29:05 and replaced with the original clean version

41swara (@41swara) 's Twitter Profile Photo

Join us this Thursday as we dive deep into the ByBit hack. Get insights from both the cyberscurity and Blockchain security perspective and how to build a secure Blockchain ecosystem. Speakers: Bright Mawudor,PhD Mrima. Victor Okafor RSVP: calendar.app.google/j2V3ELiCn9tYkw…

Join us this Thursday as we dive deep into the ByBit hack. Get insights from both the cyberscurity and Blockchain security perspective and how to build a secure Blockchain ecosystem.
Speakers: <a href="/BRIGHTZEED/">Bright Mawudor,PhD</a> <a href="/kvltbyte/">Mrima</a>. <a href="/turvec_dev/">Victor Okafor</a>
RSVP: calendar.app.google/j2V3ELiCn9tYkw…
One Dev #codeafricaconference (@_one_dev) 's Twitter Profile Photo

Mrima is a smart contract engineer 41swara. With the increase adoption of web3 technology in Africa, security is essential to ensure users' assets are safe and secure. Mrima will help the Hackathon participants not only build working products, but products that are

<a href="/kvltbyte/">Mrima</a> is a smart contract engineer <a href="/41swara/">41swara</a>.

With the increase adoption of web3 technology in Africa, security is essential to ensure users' assets are safe and secure.

<a href="/kvltbyte/">Mrima</a> will help the Hackathon participants not only build working products, but products that are
ZachXBT (@zachxbt) 's Twitter Profile Photo

Fluxkz 𐤊 CatDog I am not interested in taking on work in ecosystems who do not support my work. Only currently assist victims in the Solana, Ethereum, OP, Arbitrum, Bitcoin ecosystems. Outside of these no others have given grants, donations, or retained me thus I will likely not help as I

logic destroyer (@splinedrive) 's Twitter Profile Photo

C++23 is not for toy-language coders. If you're playing with PHP, JS, Python, or Rust , stay in your lane. This is for real engineers with academic background.

Mrima (@kvltbyte) 's Twitter Profile Photo

lfg!!!! with glider you can literally map bugs across an entire chain in seconds... lets keep the blockchain secure!