Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Finding a Vulnerability in Teamwork Cloud Server - 350

Sick CodesPosted 5 Years Ago

Solarwind Auth Bypass- 349

CERT Coordination CenterPosted 5 Years Ago

Joomla ACL Security Vulnerabilities- 348

Rohan SharmaPosted 5 Years Ago

Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service- 347

Bill DemirkapiPosted 5 Years Ago

Exploiting a Single Instruction Race Condition in Binder- 346

Maxime Peterlin & et al - Longterm SecurityPosted 5 Years Ago

CVE-2017-12542: iLO Auth Bypass- 345

Fabien Perigaud - SynackTIVPosted 5 Years Ago

Serenity OS Privilege Escalation via a Race Condition- 344

HXP CTF TeamPosted 5 Years Ago

Privilege Escalation in FreeBSD - 343

ZDI - Lucas LeongPosted 5 Years Ago

Authentication bypass vulnerability in Bouncy Castle- 342

SynopsisPosted 5 Years Ago

Now you C me, now you don't, part two: exploiting the in-between- 341

Bas AlbertsPosted 5 Years Ago