Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Mass account takeovers using HTTP Request Smuggling on Slack- 163

Evan CustodioPosted 6 Years Ago

Twinkly - 162

F-SecurePosted 6 Years Ago

Eventory Pentest Report- 161

SecuritumPosted 6 Years Ago

Breaking the Competition (Bug Bounty Write-up)- 160

George OPosted 6 Years Ago

Dangers of Localhost Servers- 159

ZemnmezPosted 6 Years Ago

BASH without normal alphanumeric characters- 158

LiveOverflowPosted 6 Years Ago

NAS Command Injection with an Auth Bypass- 157

ISEPosted 6 Years Ago

Web Cache Deception- 156

Omer GilPosted 6 Years Ago

The Layman's Guide to Zero-Day Engineering- 155

RET 2 FolksPosted 6 Years Ago

ASLR Protections for Statically Linked Executables- 154

Ryan O'Neill - LeviathanPosted 6 Years Ago