Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Cryptography Principles- 1661

Filippo ValsordaPosted 1 Year Ago

[CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds- 1660

D3VILPosted 1 Year Ago

How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground- 1659

Alex SchapiroPosted 1 Year Ago

One-Click RCE in ASUS’s Preinstalled Driver Software- 1658

Mr BruhPosted 1 Year Ago

Statistical Analysis to Detect Uncommon Code- 1657

Tim BlazytkoPosted 1 Year Ago

The Path to Memory Safety is Inevitable - 1656

Shaen Chang - Hardened LinuxPosted 1 Year Ago

CVE-2025-30147 - The curious case of subgroup check on Besu- 1655

Antonio Sanso - EthereumPosted 1 Year Ago

Solana: The hidden dangers of lamport transfers- 1654

OtterSec - Nicola VellaPosted 1 Year Ago

Post-Mortem: PT Collateral Pricing Incident- 1653

LoopscalePosted 1 Year Ago

AI Slop Is Polluting Bug Bounty Platforms with Fake Vulnerability Reports- 1652

Sarah GoodingPosted 1 Year Ago