Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Users using EIP-1271 for signatures can be forced into loans as the wrong party without consent- 1304

MiloTruckPosted 2 Years Ago

A year of Competitive Audits - 1303

MiloTruckPosted 2 Years Ago

Beanstalk's all BEAN can be drained by hacker. Due to bug in convertFacet and LibWellConvert- 1302

BeanstalkPosted 2 Years Ago

Oracle Multithreading- 1301

OraclePosted 2 Years Ago

CVE-2023-22524: RCE Vulnerability in Atlassian Companion for macOS- 1300

Ron MasasPosted 2 Years Ago

Arbitrary Address Spoofing Attack: ERC2771Context Multicall Public Disclosure- 1299

Open ZeppelinPosted 2 Years Ago

Twitter XSS + CSRF Issue- 1298

Chaofan ShouPosted 2 Years Ago

Finding a Critical Vulnerability in Astar- 1297

ZellicPosted 2 Years Ago

That's FAR-out, Man- 1296

Dataflow SecurityPosted 2 Years Ago

A Touch of Pwn - Part I- 1295

Blackwing IntelligencePosted 2 Years Ago