Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

A Systematic Study of Elastic Objects in Kernel Exploitation- 318

Yueqi Chen,Zhenpeng Lin,Xinyu XingPosted 5 Years Ago

Saltstack Command Injection- 317

KP Choubey - ZDIPosted 5 Years Ago

Post-Auth RCE and Persistence on UOKOO Security Cameras- 316

Hex FishPosted 5 Years Ago

Tivoli Madness- 315

VoidSecPosted 5 Years Ago

Platypus Attack- 314

Several University ProfessorsPosted 5 Years Ago

How Do People Find Bugs? - 313

David - FacebookPosted 5 Years Ago

Exploiting dynamic rendering engines to take control of web apps- 312

Vasilii Ermilov - r2cPosted 5 Years Ago

Remote code execution in Elixir-based Paginator- 311

Peter Stöckli - AlphabotPosted 5 Years Ago

Fuzzing EBPF JIT Bugs in the Linux Kernel- 310

Simon ScannellPosted 5 Years Ago

SSRF in Google Cloud Monitoring- 309

David NechutaPosted 5 Years Ago