Jason SchwarzExploiting Smart Contracts: Strict EqualitiesThis guide covers the dangerous-strict-equalities attack vector, providing detailed setup instructions, code examples, execution steps, and…Jul 15Jul 15
Jason SchwarzinCoinmonksExploiting Smart Contracts: Understanding and Performing Reentrancy Attacks in SolidityIn this tutorial, we demonstrate how to create a reentrancy exploit in Solidity, including detailed setup, code examples, and execution…Jun 242Jun 242
Jason SchwarzinCoinsBenchUnderstanding Flash Loans in DeFiIn the realm of decentralized finance (DeFi), opportunities often arise that demand swift action to capitalize on them. One such…Jun 19Jun 19
Jason SchwarzinCoinsBenchManaging Whitelist Overload: Ensuring Effective NFT drops with Proof of FundsHow often have you curated a whitelist based on partners and community members, only to find the user count far exceeds the total supply of…Jun 18Jun 18
Jason SchwarzinCoinsBenchHow to sign and verify messages with EthersDigital signatures play a crucial role in ensuring the security, authenticity, and authorization of various operations within a…Jun 15Jun 15