Published inInfoSec Write-upsWhy you should care about the xz exploitThe greatest backdoor there never was: CVE-2024–3094Apr 10, 2024Apr 10, 2024
Published inGeek CultureBuilding a game in Solid.jsSimple game development on the webApr 8, 2024Apr 8, 2024
Published inGeek Culture5 Concepts Every Brand New Programmer Needs to KnowSo, you just got started with programming? Every programming language is different, but there are many concepts that are universally shared…Dec 18, 2023Dec 18, 2023
Published inInfoSec Write-upsHow I Found My FIRST Vulnerability/Bug Bounty and How You Can Too: Part 1How to start ethically hacking websitesSep 17, 20221Sep 17, 20221
Published inInfoSec Write-upsHow I Found My FIRST Vulnerability/Bug Bounty and How You Can Too: Part 2Simple hacks!Sep 17, 20222Sep 17, 20222
Published inInfoSec Write-upsSometimes times the best hack is no hack at all — $2900 Shopify Bug BountyAccess control is key.Aug 26, 20221Aug 26, 20221
Published inInfoSec Write-upsThis SIMPLE trick will exploit image uploads - $2500 TikTok bug bounty.Stored XSS in SVG files.Aug 25, 2022Aug 25, 2022
Published inGeek CultureHow to Protect Against the Most Dangerous Web Application Security Risk3 easy ways to prevent a data leak.Aug 21, 2022Aug 21, 2022
How to Create 4K Artwork using DALL·E 2Don’t be restricted by the default 1000x1000 pixel outputs.Aug 20, 2022Aug 20, 2022