Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

An EPYC escape: Case-study of a KVM breakout - 540

Felix Wilhelm - Project Zero (P0)Posted 4 Years Ago

Multiple Vulnerabilities Affecting 129 Dell Models via Dell Remote OS Recovery and Firmware Update Capabilities- 539

EclypsiumPosted 4 Years Ago

Cisco Hyperflex: How We Got RCE Through Login Form and Other Findings- 538

Nikita Abramov & Mikhail Klyuchnikov - PT SwarmPosted 4 Years Ago

Espressif ESP32: Bypassing Flash Encryption- 537

RaelizePosted 4 Years Ago

Espressif ESP32: Controlling PC during Secure Boot- 536

RaelizePosted 4 Years Ago

Bypassing Bypassing Secure Boot using EMFI- 535

RaelizePosted 4 Years Ago

Why mimicking a device is becoming almost impossible- 534

multiloginPosted 4 Years Ago

Bypassing 2FA using OpenID Misconfiguration- 533

youstinPosted 4 Years Ago

Understanding UEFI Secure Boot Chain- 532

IntelPosted 4 Years Ago

Hardware Root of Trust — Bios and UEFI - 531

Maxfield Chen - Security InnovationPosted 4 Years Ago