Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Remote iPhone Exploitation: 3 Part Series- 133

Google Project ZeroPosted 6 Years Ago

The Bug that Exposed Your Paypal Password - 131

Alex BirsanPosted 6 Years Ago

Tik or Tok? Is TikTok secure enough?- 130

Checkpoint ResearchPosted 6 Years Ago

Breaking PHP's mt_rand() with 2 values- 129

AmbionicsPosted 6 Years Ago

Command Injection Exploitation in Mi Router 3- 128

Shaun Mirani at ISEPosted 6 Years Ago

What is Phar Deserialization - 127

Johnannes Dahse at RIPSTechPosted 6 Years Ago

Vulns in TerraMaster - 126

Joshua Meyer at ISEPosted 6 Years Ago

Out of Bounds Write in Apple's ICMP Handling- 125

Kevin BackhousePosted 6 Years Ago

Abusing Microsoft Office Online Video - 124

Avihai Ben-YossefPosted 6 Years Ago

Technical Rundown of WebExec- 123

Skull SecurityPosted 6 Years Ago