Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Exploiting CSGOJackpot's Weak RNG- 298

Nick JonasPosted 5 Years Ago

Look mum, no key! Bypassing Encrypted Secure Boot at Hardware.io- 297

Cristofaro Mune & Niek TimmersPosted 5 Years Ago

Kernel exploitation: weaponizing CVE-2020-17382 MSI Ambient Link driver- 296

Matteo MalvicaPosted 5 Years Ago

There’s A Hole In Your SoC: Glitching The MediaTek BootROM- 295

Ilya Zhuravlev - nccgroupPosted 5 Years Ago

Assault Cube RCE- 294

Elon GliksbergPosted 5 Years Ago

Time Based SQLi in the Referer Header- 293

Yassine BenfakihPosted 5 Years Ago

Rollback Attack on Mozilla Firefox - 292

Xiaoyin LiuPosted 5 Years Ago

Abusing Teams client protocol to bypass Teams security policies- 291

Nestori Syynimaa - o365BlogPosted 5 Years Ago

Remote Command Execution in Ruckus IoT - 290

Adepts of 0xCCPosted 5 Years Ago

Code Vulnerabilities Put Health Records at Risk- 289

Dennis Brinkoff - sonarsourcePosted 5 Years Ago