Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Two VMware Workstation TOCTOU Vulnerabilities - 288

Reno Robert - ZDIPosted 5 Years Ago

Breaking the Java Verifier #2 (After Java 7)- 287

ByteChefPosted 5 Years Ago

Breaking the Java Verifier #1 (Prior to Java 8)- 286

ByteChefPosted 5 Years Ago

QualComm QCMAP Vulns- 285

Ori Hollander, Asaf Karas - vdooPosted 5 Years Ago

Repo Jacking: Exploiting the Dependency Supply Chain- 284

Indiana Moreau - Security InnovationPosted 5 Years Ago

RCE via Samsung Galaxy Store App- 283

Ken Gannon - FSecurePosted 5 Years Ago

Learning to Decapsulate Integrated Circuits using Acid Deposition- 282

Juan Carlos JimenezPosted 5 Years Ago

Hotspot Shield VPN Privilege Escalation - 281

Chen Erlich - cymptomPosted 5 Years Ago

Penetration Testing and Low-Cost Freelancing- 280

George ChatzisofroniouPosted 5 Years Ago

Account takeover via open redirect - Github Gist- 279

William BowlingPosted 5 Years Ago