Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

A smorgasbord of a bug chain: postMessage, JSONP, WAF bypass, DOM-based XSS, CORS, CSRF…- 1174

Julien CretelPosted 2 Years Ago

Enzyme Finance Missing Privilege Check Bugfix Review- 1173

ImmunefiPosted 2 Years Ago

Stealing Gas: Bypassing Ethermint Ante Handlers- 1172

Felix WilhelmPosted 2 Years Ago

Election Fraud? Double Voting in Celer’s State Guardian Network- 1171

Felix WilhelmPosted 2 Years Ago

The deposit Transaction lack of expiration timestamp check and slippage control- 1170

SherlockPosted 2 Years Ago

CS:GO: From Zero to 0-day - 1169

NeodymePosted 3 Years Ago

Curve LP Oracle Manipulation: Post Mortem- 1168

Chain SecurityPosted 3 Years Ago

See this page fetch itself, byte by byte, over TLS- 1167

subtlsPosted 3 Years Ago

I Hack, U-Boot- 1166

SynAcktivPosted 3 Years Ago

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1- 1165

Eviatar Gerzi - CyberArkPosted 3 Years Ago