PinnedDavid MerianYou CAN Hack CarsCar theft in the wild has gone high tech. By exploiting the unencrypted CAN (controlled area network) in the headlight of a Toyota RAV 4…Apr 27, 20233Apr 27, 20233
PinnedDavid MerianinSystem WeaknessChatGPT Linux Privilege EscalationChatGPT can give you tips on privilege escalation—though you will need to prompt it to help you avoid privilege escalantion. You will…Mar 30, 2023Mar 30, 2023
PinnedDavid MerianFuzz Open Source, Get Paid by GoogleThe OSS-Fuzz project by Google increased their rewards. How you earn: integrate OSS-Fuzz into a critical open source project and find bugs…Feb 9, 20231Feb 9, 20231
PinnedDavid MerianinSystem WeaknessChatGPT for Blue Teams and AnalysisUse ChatGPT for various blue team tasks.Feb 15, 2023Feb 15, 2023
PinnedDavid MerianinSystem WeaknessChatGPT hacking tools for bug bounty, pentesting, blue teams, and moreHackers aren’t shy in exploiting brilliant tools like ChatGPT. They have used ChatGPT’s capabilities to speed up script writing…Jan 11, 20232Jan 11, 20232
David MerianinCoinmonksWeb2, Web3 All HackableWeak security, bad security practices, and fragile engineering designs underpin nearly every digital system. But it’s not all hopeless.Aug 5Aug 5
David MerianinOSINT TeamFuzzing Can Stop IT MeltdownsCrowdStrike can prevent catastrophic IT glitches with modern code testing techniques in their QA process.Jul 22Jul 22
David MerianinCoinmonksWhat I Learned from a Web3 ConferenceI’ve been in cybersecurity in Web2 for 10 years. In my first foray into web3, this is what I’ve learned.Jul 173Jul 173
David MerianinCoinmonksHack Smart ContractsCombining LLMs (large language models) and fuzzers, hackers can own smart contracts and earn bounties—in a much more automated way.Jun 121Jun 121
David MerianVirtual Patching CarsUntil a proper patch is delivered OTA (over the air), technologies like virtual patching are an interim protection until that patch is…Apr 30Apr 30