Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Communicate to SMTP Server with Telnet- 340

Carrie Roberts - Black Hills InfosecPosted 5 Years Ago

Portable Data ExFiltration: XSS for PDFs- 339

Gareth HeyesPosted 5 Years Ago

Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!- 338

Yarden ShafirPosted 5 Years Ago

SAML validation weakness in SAP HANA- 337

Martin GalloPosted 5 Years Ago

CVE-2020-25695 Privilege Escalation in Postgresql- 336

staaldraadPosted 5 Years Ago

Cross Site Leaks Wiki(XSLeaks) - 335

xsleaksPosted 5 Years Ago

Vulnerabilities in McAfee ePolicy Orchestrator- 334

Mikhail Klyuchnikov - PTSecurityPosted 5 Years Ago

Finding vulnerabilities in Valve’s 'Steam Sockets' (Game On)- 332

Eyal Itkin - CheckpointPosted 5 Years Ago

Apple macOS Kernel OOB Write Privilege Escalation Vulnerability- 331

Ziad BadawiPosted 5 Years Ago

Abuses on W- 330

Lorenzo Stella - DoyensecPosted 5 Years Ago