Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Vulnerabilities in LUKS2 disk encryption for confidential VMs- 1770

Tjaden Hess - Trail of BitsPosted 6 Months Ago

CVE-2025-59287 — WSUS Remote Code Execution- 1769

hawktracePosted 6 Months Ago

Vibecoding and the illusion of security- 1768

Kevin Joensen - baldurPosted 6 Months Ago

We May Have Finally Fixed Python’s 25-Year-Old Vulnerability- 1767

Yehuda ChikvashviliPosted 6 Months Ago

A questionable design choice in Stacks/Clarity- 1766

100 ProofPosted 6 Months Ago

TEE.fail: Breaking Trusted Execution Environments via DDR5 Memory Bus Interposition- 1765

Georgia Tech and PurduePosted 6 Months Ago

WebAudio AudioWorklets run V8 with disabled denormalized floats - 1764

Samuel GroB - Project ZeroPosted 6 Months Ago

How to Protect Yourself Against North Korean Fake Employees- 1763

knowbe4Posted 6 Months Ago

The Python Paradox- 1762

Paul GrahamPosted 6 Months Ago

WSO2 #3: Server-side request forgery- 1761

crnkovicPosted 6 Months Ago