Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Exploiting Static Site Generators: When Static Is Not Actually Static- 991

Asset NotePosted 3 Years Ago

Exploiting Xbox Game Frogger Beyond to Execute Arbitrary Unsigned Code- 990

Artem GarmashPosted 3 Years Ago

Curve LP Oracle Manipulation: Post Mortem- 989

Chain SecurityPosted 3 Years Ago

Towards the next generation of XNU memory safety: kalloc_type- 987

Apple SecurityPosted 3 Years Ago

Visual Studio Code Jupyter Notebook RCE- 986

Luca Carettoni - DoyenSecPosted 3 Years Ago

Cisco Jabber: XMPP Stanza Smuggling with stream:stream tag- 984

Ifratric - Google Project ZeroPosted 3 Years Ago

A Journey To The Dawn - CVE-2022-1786 - 983

KyleBotPosted 3 Years Ago

Bypassing vtable Check in glibc File Structures- 982

KyleBotPosted 3 Years Ago

A “Hat Trick” of DeFi Hacks Underscores the Importance of DeFi Security- 981

HalbornPosted 3 Years Ago

Stranger Strings: An exploitable flaw in SQLite- 980

Andreas Kellas - Trail of BitsPosted 3 Years Ago