Infiltr8: The Red-Book
Ctrlk
Infiltr8ForumGitHub
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
    • Initial Access
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • Smart Contracts Pentesting
    • 🛠️On-Chain Analysis
    • Smart Contract Vulnerabilities
      • EVM Attack Surfaces
      • Contract Lifecycle & Upgradeability
      • 🛠️Protocol Layer Attack Surfaces
        • AMMs (Automated Market Makers)
        • Oracles
        • Lending Protocols
  • 🛠️Cloud & CI/CD Pentesting
    • CI/CD
    • Azure Pentesting
    • GCP Pentesting
    • AWS Pentesting
Powered by GitBook
On this page

Was this helpful?

Edit
  1. Smart Contracts Pentesting
  2. Smart Contract Vulnerabilities
  3. 🛠️Protocol Layer Attack Surfaces

Lending Protocols

Was this helpful?