PinnedPublished inInfoSec Write-upsGSuite domain takeover through delegationJul 27, 2022611Jul 27, 2022611
Pinned1-click RCE in Electron ApplicationsHow simple link opening leads to RCEApr 22, 2022116Apr 22, 2022116
PinnedPublished inTowards AWSPointer: Hunting Cobalt Strike globallyIntroductionSep 16, 2021100Sep 16, 2021100
I have just realized that more people found similar stuff at the same time)If you are interested I found a couple of attack vectors in October 2022. I have described them here:Sep 14, 2023Sep 14, 2023
Published inBLOCK6Optimism 2M$ vulnerability, post reviewThe review of the money printing vulnerability in Optimistic RollupJul 21, 2022791Jul 21, 2022791
Finding SQL Injections through source code in .NET applicationsCodeAllTheThingsJul 8, 202219Jul 8, 202219
Finding broken access controls through source code in .NET applicationsCodeAllTheThingsMay 25, 20229May 25, 20229
Phishing and credential harvesting in Electron applicationsPhishing in misconfigured Electron appsMar 30, 202260Mar 30, 202260