Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Authentication Bypass when using JWT w/ public keys- 690

Plokta - HackerOnePosted 4 Years Ago

Stored XSS via Mermaid Prototype Pollution vulnerability- 689

Misha98857 - HackerOnePosted 4 Years Ago

This shouldn't have happened: A vulnerability postmortem - 688

Tavis Ormandy - Project Zero (P0)Posted 4 Years Ago

Discovering Full Read SSRF in Jamf - 687

Shubham Shah - AssetNotePosted 4 Years Ago

Fall of the machines: Exploiting the Qualcomm NPU (neural processing unit) kernel driver- 686

Man Yue Mo - Github Security LabsPosted 4 Years Ago

Linux: UAF read: SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect())- 685

Jann HornPosted 4 Years Ago

Full key extraction of NVIDIA TSEC- 684

plutoooPosted 4 Years Ago

TPM sniffing - 683

Thomas Dewaele & Julien Oberson - Sec TeamPosted 4 Years Ago

Sigint for the rest of us - 682

Matt Blaze - WiFi Village DEFCON 25Posted 4 Years Ago

Sigint for the rest of us - 681

Matt Blaze - WiFi Village DEFCON 25Posted 4 Years Ago