Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol- 1314

ThaliumPosted 2 Years Ago

Levana Exploit Postmortem- 1313

LevanaPosted 2 Years Ago

msg.data Hashing is bad- 1312

ddimtrov22Posted 2 Years Ago

IBC Rate Limits: Introduction and State of the Art (1/3)- 1311

Andres MontyPosted 2 Years Ago

Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() call- 1310

Alex Plaskett - NCC GroupPosted 2 Years Ago

Cookie Bugs - Smuggling & Injection- 1309

Ankur SundaraPosted 2 Years Ago

IppSec Search Engine- 1308

IppSecPosted 2 Years Ago

Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari- 1307

Daniel Thatcher - Intruder.ioPosted 2 Years Ago

SSH ProxyCommand == unexpected code execution (CVE-2023-51385)- 1306

Vin01Posted 2 Years Ago

codehash check in factory contracts does not account for non-empty addresses- 1305

MiloTruck - Wildcat C4Posted 2 Years Ago