Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers- 22

TheHackerNewsPosted 6 Years Ago

Bounty leftover Part #3- 21

Into the Symmetry Posted 6 Years Ago

BeeToken’s ICO Hit by Phishing Scam- 20

HackReadPosted 6 Years Ago

CryptoCurrency Minning Malware Infected Over a Half Million Machines- 19

TheHackerNewsPosted 6 Years Ago

How Containers & Serverless Computing Transform Attacker Methodologies- 17

Dark ReadingPosted 6 Years Ago

My First Article about DNS Hijacking- 16

Dark ReadingPosted 6 Years Ago

Malware Reversing - Burpsuite Keygen- 15

lkwPosted 6 Years Ago

Current State of the Microsoft DDE attacks- 14

DominicPosted 6 Years Ago

Unauthenticated LAN remote code execution in AsusWRT- 13

Pedro RibeiroPosted 6 Years Ago

Electron URI Handler RCE- 12

Tomas LažauninkasPosted 6 Years Ago