Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Weaknesses in Bitcoin’s Merkle Root Construction- 1474

Linux Foundation Posted 1 Year Ago

Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources- 1473

NautilusPosted 1 Year Ago

Front-End Frameworks: When Bypassing Built-in Sanitization Might Backfire- 1472

Stefan Schiller - Sonar SourcePosted 1 Year Ago

Android Jetpack Navigation: Go Even Deeper- 1471

Artem Kulakov - PTSwarm Posted 1 Year Ago

Why ORMs and Prepared Statements Can't (Always) Win- 1470

Thomas Chauchefoin - Sonar SourcePosted 1 Year Ago

Threshold Transaction Malleability Bugfix Review- 1469

Immunefi - KayabaPosted 1 Year Ago

Ambush Attacks on 160-bit Object IDs and Addresses- 1468

Mysten labsPosted 1 Year Ago

Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! - 1467

Orange Tsai Posted 1 Year Ago

0.0.0.0 Day: Exploiting Localhost APIs From the Browser- 1466

Avi Lumelsky - Oligo SecurityPosted 1 Year Ago

Bypassing Rockwell Automation Logix Controllers’ Local Chassis Security Protection- 1465

Sharon Brizinov - Team82Posted 1 Year Ago