This release brings improved Ethereum support, performance improvements, and numerous bug fixes. Thanks to our external contributors!
- [cole-lightfighter](https://github.com/cole-lightfighter)
- [arunjohnkuruvilla](https://github.com/arunjohnkuruvilla)
- [Srinivas11789](https://github.com/Srinivas11789)
- [sidhant-gupta-004](https://github.com/sidhant-gupta-004)
- [roachspray](https://github.com/roachspray)
- [dbogs425](https://github.com/dbogs425)
- [HighW4y2H3ll](https://github.com/HighW4y2H3ll)
- [chowdaryd](https://github.com/chowdaryd)
A few comments on Ethereum support:
Manticore includes an implementation of a symbolic [Ethereum Virtual Machine (EVM)](https://manticore.readthedocs.io/en/latest/api.html#module-manticore.platforms.evm), an [EVM disassembler/assembler](https://manticore.readthedocs.io/en/latest/api.html#evm-assembler), and a convenient interface for automated compilation and analysis of Solidity. It also integrates with [Ethersplay](https://github.com/trailofbits/ethersplay), Trail of Bits’ visual disassembler for EVM bytecode, for analysis visualization. As with binaries, Manticore offers a simple command line interface and a Python API for analysis of EVM bytecode. See a demo: https://asciinema.org/a/154012
EVM features in Manticore are under [active development](https://github.com/trailofbits/manticore/labels/ethereum) and [bounties](https://github.com/trailofbits/manticore/wiki#bounties) are available for feature enhancements and bugfixes. Join us on the [Empire Hacking Slack](https://empireslacking.herokuapp.com) in #ethereum to discuss using or hacking on these EVM features with the developers.