A comprehensive curated handbook and resource list for investigating crypto hacks and on-chain security incidents using various tools and methodologies.
Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
This repository serves as a centralized documentation resource for security researchers, threat hunters, and blockchain analysts investigating crypto hacks and security incidents. Users can leverage the extensive list of tools, manuals, and methodologies to perform threat hunting, risk assessment, and security training in the blockchain and crypto domain.
All information is provided for educational purposes only and based on public sources; users should follow strict InfoSec and OpSec guidelines and perform investigations on secure, isolated devices. Contributions and PRs are encouraged to keep the resource up to date.