Welcome to my github page! ✨✨ Please help save my github contributions, the snake is eating all of them!
I’m Louis Tsai, living on Ethereum Mainnet and contributing to its decentralized future.
Graduated from NTU as a CS student, I focus on Web3 Security and Ethereum Research.
As a white hat at DeFiHackLabs, I analyze attack incidents, join CTF challenges,
and participate in audit competitions at Cantina & Codehawks.
I also enjoy creating fun projects and exploring new ideas, now is a vibe coder.
eth / acc
💻 Software Development Backend Intern @ Junyi Academy Software Trainee @ AppWorks |
🛡️ Web3 Security Web3 Security Intern @ Amber Group Auditing Fellowship @ yAcademy |
⛓️ Ethereum Research EEST Intern @ Ethereum Foundation Blockchain Dev Trainee @ AppWorks |
👾 Awesome Smart Contract Analysis Tools
TLDR: Curated list of smart‑contract analysis & auditing tooling. Role: Maintainer
|
|
👾 FintechIntro
TLDR: Materials for NTU “Introduction to Decentralized Finance”. Role: Maintainer · Teaching
|
👾 DeFiHackLabs
TLDR: Reproducing DeFi incidents with Foundry . See analyses: past‑attack‑incident.Role: Contributor
|
👾 Reverse Engineering EVM Bytecode with GhidraMothra is an extension that brings disassembly, control-flow graphing, and decompilation of EVM bytecode into Ghidra , enabling practical reverse engineering of Ethereum smart contracts.
Event:
Devcon 7 · English |
👾 Mothra: A Ghidra EVM ExtensionMothra is a Ghidra extension that enables EVM decompilation and interactive analysis, bridging Web2 reverse engineers into Web3 security through use cases such as unverified contract forensics and CTF challenges.
Event:
Black Hat Europe 2024 · English |
👾 Exploring Contract Analysis Tools by Unveiling Real-World Upgradeable Proxy VulnerabilitiesThis presentation introduces common smart contract security detection tools, using upgradeable proxies as a case study to show how these tools help identify well-known vulnerabilities and mitigate risks before they lead to real-world exploits. Event:
COSCUP 2024 · Chinese |
👾 Mastering Web3 Security: From Tracking Attacks to Reproducing ExploitsThis talk explores Web3 security from attack trace analysis to exploit reproduction, introducing methods to track the latest incidents, study common vulnerabilities, and use Foundry to recreate attacks, with a live demo on contributing to DeFiHackLabs PoCs Event:
Ethereum Taipei Meetup · Chinese |
👾 Reentrancy Vulnerabilities and DEX Security AnalysisThis is a study group session on blockchain security that focuses on security concerns related to Reentrancy issue and Decentralized Exchanges (DEXs), including price manipulation, swap path issues, and non-standard tokens. Event:
DeFiHackLabs Study Group · Chinese |
👾 Security Challenges in Ethereum Layer 2 and Cross-Chain EcosystemsAs Ethereum scales through rollups and bridges, this talk uncovers their emerging security pitfalls and discusses how researchers and developers can mitigate these risks Event:
CyberSec 2025 · Chinese |
👾 Ethereum Object Format (EOF): Necessary Evil or Needless Complexity?This talk gives a technical and neutral overview of the Ethereum Object Format (EOF) — explaining what it solves, what it breaks, why it was removed from Fusaka, and whether it could return in the future. Event:
COSCUP 2025 · English |
👾 A Deep Dive into EOF and Its Impact on Program AnalysisThis talk explores how the Ethereum Object Format (EOF) reshapes program analysis and reverse engineering, highlighting differences from legacy EVM, new control-flow mechanisms, and integration into the Mothra decompiler. Event:
ETH Taipei 2025 · English |
A Solidity developer, auditor, enthusiast now