PinnedPublished inEden Block GreenhouseEthereum’s Economic Evolution: The Role of Proposer-Builder SeparationYou can find the original article posted on our website…Dec 8, 2023Dec 8, 2023
Published inEden Block GreenhouseThe Inception of Doppelganger NetworksYou can find the original article posted on our website https://www.edenblock.com/post/the-inception-of-doppelganger-networksJan 22Jan 22
Published inConsenSys DiligencePoison Block Explorer Byte CodeYou will understand how to trick a block explorer into displaying different byte code of your choosing, other than the one deployed on the…Feb 14, 2019Feb 14, 2019
Published inConsenSys DiligenceHow to Exploit Ethereum in a Virtual EnvironmentThis is going to be a series about some of the techniques I implemented when designing Karl, a free tool that finds exploitable code in…Jan 24, 2019Jan 24, 2019
CTF — Lock BoxThis is one of the challenges in the series provided by Security InnovationJan 15, 2019Jan 15, 2019
CTF - DonationThis is the first challenge in the series provided by Security InnovationJan 13, 2019Jan 13, 2019