Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Remote kernel heap overflow- 848

m00nbsd - HackerOnePosted 3 Years Ago

F5 iControl REST Endpoint Authentication Bypass Technical Deep Dive- 847

James Horseman - horizon3.aiPosted 3 Years Ago

VMware Authentication Bypass Vulnerability (CVE-2022-22972) Technical Deep Dive- 846

James Horseman - horizon3.aiPosted 3 Years Ago

Virtualizing a Fan Controller with GNU Radio- 845

Grant Hernandez Posted 3 Years Ago

CVE-2022-27666: Exploit esp6 modules in Linux kernel- 844

etenalPosted 3 Years Ago

When “secure” isn’t secure at all- 843

Martin Smolár - WeLiveSecurityPosted 3 Years Ago

FIRMWIRE: Transparent Dynamic Analysis for Cellular Baseband Firmware- 842

Grant Hernandez, Marius Muench & Dominik MaierPosted 4 Years Ago

Tricking Android Smart Lock With Bluetooth- 841

Trifinite - Martin HerfurtPosted 4 Years Ago

Aave V3’s Price Oracle Manipulation Vulnerability- 840

HacxykPosted 4 Years Ago

Improving Your Embedded Linux Security Posture with Yocto- 839

Jon Szymaniak - NCC GroupPosted 4 Years Ago