Publié dans 2018

How to steal Ethers: scanning for vulnerable contracts

Four years ago, I wrote an article « How to steal Bitcoins » that was about finding address corresponding to weak brainwallets, and some forensic evidence that it was exploited automatically, for profit.

Lire plus...


Pakala: yet another EVM symbolic execution tool

Pakala is a tool for symbolic execution of EVM bytecode (like Manticore or Mythril).

Lire plus...


Syncing a Parity Archive Node: How-To

For my experiments, I set on having an Ethereum archive node (with the full history of all the states), with Parity.

Lire plus...