Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Why exploits prefer memory corruption- 1534

sha1lanPosted 1 Year Ago

Code auditing is not the same as vulnerability research- 1533

sha1lanPosted 1 Year Ago

Filecoin Boost: Clients can create PublishConfirmed but never-AddedPiece (handoff) deals- 1532

Qiuhao LiPosted 1 Year Ago

$150,000 Evmos Vulnerability Through Reading Documentation- 1531

jayjonah.ethPosted 1 Year Ago

Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 - 1530

synacktivPosted 1 Year Ago

An analysis of the Keycloak authentication system- 1529

Maurizio Agazzini - HN Security Posted 1 Year Ago

Cracking into a Just Eat / Takeaway.com terminal with an NFC card- 1528

MarcelPosted 1 Year Ago

“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack- 1527

GuardioPosted 1 Year Ago

Hacking 700 Million Electronic Arts Accounts- 1526

Sean KahlerPosted 1 Year Ago

AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover- 1525

AquaSecPosted 1 Year Ago