Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
When looking at the raspberry pi camera API, this person found an RCE via input being sent during a command.
When looking through PHP applications, simply just grepping for malicious functions can net some serious vulnerabilities! In this case, the system function caused a major vulnerability.
The date binary can be used for priv esc :)
This application also had a directory traversal vulnerability that allowed for arbitrary file reading.