Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Scroll Chain DoS via CCC Overflows in Single User Transactions + Drama- 1641

Pavel ShabarkinPosted 1 Year Ago

How Go Mitigates Supply Chain Attacks- 1640

Filippo Valsorda - GolangPosted 1 Year Ago

How I made $64k from deleted files — a bug bounty story- 1639

Sharon BrizinovPosted 1 Year Ago

Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit- 1638

GrimdoomerPosted 1 Year Ago

Choosing an Audit Competition: How to Spot Snake Oil- 1637

ZellicPosted 1 Year Ago

unsound transmute in bpf_loader::syscalls- 1636

WorkingJubilee AgavePosted 1 Year Ago

SAML roulette: the hacker always wins- 1635

Portswigger - Gareth HeyesPosted 1 Year Ago

Meet DAVE: Discord’s New End-to-End Encryption for Audio & Video- 1634

Discord - Stephen BirardaPosted 1 Year Ago

Sec-Gemini v1 - a new experimental cybersecurity model - 1633

GooglePosted 1 Year Ago

The Three Prompts of Spec Thinking: Yet Another Lens for Smart Contract Auditing- 1632

DraveePosted 1 Year Ago