Skip to content
View kidd0123's full-sized avatar

Block or report kidd0123

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. cryptopals cryptopals Public

    Python

  2. kidd0123.github.io kidd0123.github.io Public

    CSS

  3. Understanding spring4Shell Severity Understanding spring4Shell Severity
    1
    I have done a bit more research on the vulnerability itself and want to share the details in writing to better help my own understanding of the vulerability - before you read further two things
    2
    - My java knowledge is extremely dated. 
    3
    - Everything I mention here is already explained in other blogs but its more of a summation and simplification.
    4
    
                  
    5
    When you use spring-boot to build a web application you can take the request parameters (POST) and convert that into an object for easy access. (Java being  an Object oriented programming language it makes sense to do this)
  4. commaai_notes commaai_notes Public

    All notes related to turning my corolla to self driving car using comma AI

  5. log4jvulnereability log4jvulnereability Public