Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

The State of State Machines- 380

Natalie Silvanovich - Project Zero (P0)Posted 5 Years Ago

Windows Kernel DoS/Privilege Escalation via a NULL Pointer Deref - 379

Simon Zuckerbraun - ZDIPosted 5 Years Ago

Exploiting email address parsing with AWS SES- 378

Nathan DavisonPosted 5 Years Ago

Bypass SameSite Cookies Default to Lax and get CSRF- 377

RenwaPosted 5 Years Ago

Heap-based Buffer Overflow in Sudo (CVE-2021-3156)- 376

Qualys - Baron SameditPosted 5 Years Ago

Insecure Features in PDFs - 375

On Web-Security and -Insecurity Posted 5 Years Ago

Command PATH security in Go- 374

Russ CoxPosted 5 Years Ago

The Secret Parameter, LFR, and Potential RCE in NodeJS Apps - 373

CaptainFreakPosted 5 Years Ago

Unauthenticated XSS to Remote Code Execution Chain in Mautic- 372

horizon3Posted 5 Years Ago

An Incorrect Calculation Bug in the Linux Kernel eBPF Verifier - 371

Lucas Leong - ZDIPosted 5 Years Ago