Posted in 2018

How to steal Ethers: scanning for vulnerable contracts

Four years ago, I wrote an article “How to steal Bitcoins” that was about finding address corresponding to weak brainwallets, and some forensic evidence that it was exploited automatically, for profit.

Read more ...

Pakala: yet another EVM symbolic execution tool

Pakala is a tool for symbolic execution of EVM bytecode (like Manticore or Mythril).

Read more ...

Syncing a Parity Archive Node: How-To

For my experiments, I set on having an Ethereum archive node (with the full history of all the states), with Parity.

Read more ...