Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

4 Strategies for picking the perfect bounty hunting targets- 1244

Joran Honig Posted 2 Years Ago

CVE-2023-4039: GCC's -fstack-protector fails to guard dynamic stack allocations on ARM64- 1243

Tom Hebb - Red Team XPosted 2 Years Ago

Aave v3 bug bounty part 3 — `LTV-0` `AToken` poison attack! - 1242

StErMiPosted 2 Years Ago

Squashing a Pesky Bug in UniswapX- 1241

KebabsecPosted 2 Years Ago

Aave v3 bug bounty part 2: Aave liquidation process uses the wrong value... - 1240

StErMiPosted 2 Years Ago

Aave v3 bug bounty part 1: Security concerns and improvements about the `executeFlashLoan` function- 1239

StErMiPosted 2 Years Ago

AMM MEV BACKRUNNING - 1238

@NBFinanceTech - Open SensePosted 2 Years Ago

From Terminal Output to Arbitrary Remote Code Execution- 1237

solid-snailPosted 2 Years Ago

How Cross-Site Frame Counting Exposes Private Repositories on GitHub- 1236

mediPosted 2 Years Ago

When URL parsers disagree (CVE-2023-38633)- 1235

Zac Sims - Canva Posted 2 Years Ago