Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny- 1562

Eaton WorksPosted 1 Year Ago

Exploiting Reflected Input Via the Range Header- 1561

Attack Ships on FirePosted 1 Year Ago

How an obscure PHP footgun led to RCE in Craft CMS- 1560

Asset NotePosted 1 Year Ago

Arc Browser UXSS, Local File Read, Arbitrary File Creation and Path Traversal to RCE- 1559

RenwaPosted 1 Year Ago

Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection- 1558

RyotaK - Flatt SecurityPosted 1 Year Ago

Corrupt Commitments: Proposer Equivocation Bug in Helix MEV Relay- 1557

Troy Sargent - Asymmetric ResearchPosted 1 Year Ago

Hidden IDL Instructions and How To Abuse Them- 1556

Accretion - RobrePosted 1 Year Ago

Drilling the redirect_uri in OAuth- 1555

VoorivexPosted 1 Year Ago

Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform- 1554

Philippe Laulheret - TalosPosted 1 Year Ago

Program Manager’s Guide To Running a Successful Bug Bounty Program- 1553

Critical Thinking Podcast BlogPosted 1 Year Ago