I appreciate how organized the Consensys guide is laid out. It's pretty easy to read. Trail of Bits has a similar guide that is a little more in-the-weeds technically. It also covers, what we think is, essential background about certain automated analysis techniques like static analysis and how fuzzers work. Check it out!
Hi Dan! Small correction: This is not a ConsenSys guide. It's my own work. As a private person. :)
More content on offensive security techniques is yet to come, so stay tuned!
https://secure-contracts.com/