Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

AppCache's forgotten tales- 520

Luan HerreraPosted 4 Years Ago

RFID Monotonic Counter Anti-Tearing Defeated - 519

quarkslabPosted 4 Years Ago

Unlocking Smart Locks with Web Vulnerabilities- 518

Critical SecurityPosted 4 Years Ago

Grav CMS Code Execution Vulnerabilities- 517

Thomas ChauchefoinPosted 4 Years Ago

runc mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs - 516

champtarPosted 4 Years Ago

Overwolf 1-Click Remote Code Execution- 515

Joel Noguera - Sword BytesPosted 4 Years Ago

Apple AirTag Teardown & Test Point Mapping- 514

Colin O'FlynnPosted 4 Years Ago

An Incorrect Bounds Calculation in the Linux Kernel eBPF Verifier - 513

Lucas Leong - ZDIPosted 4 Years Ago

Leaky John Deere API’s- 512

sick codesPosted 4 Years Ago

Remote Code Execution in Squirrelly- 511

Agustin GianniPosted 4 Years Ago