Hacker News new | past | comments | ask | show | jobs | submit | from login
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com)
3 points by wslh 5 months ago | past | 1 comment
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com)
1 point by todsacerdoti 5 months ago | past
Discovering Deserialization Gadget Chains in Rubyland (includesecurity.com)
2 points by pentestercrab 6 months ago | past
Hunting for Mass Assignment Vulnerabilities Using GitHub CodeSearch and Grep.app (includesecurity.com)
3 points by Rendello on Sept 21, 2022 | past
Drive by Compromise: A Tale of Four WiFi Routers (includesecurity.com)
3 points by narukh on Oct 4, 2021 | past
Dependency Confusion Vulnerabilities in Unity Game Development (includesecurity.com)
1 point by ykat7 on May 1, 2021 | past
Custom Static Analysis Rules Showdown: Brakeman vs. Semgrep (includesecurity.com)
3 points by ievans on Jan 20, 2021 | past
Firmware dumping technique for an ARM Cortex-M0 SoC (2015) (includesecurity.com)
2 points by debevv on July 23, 2018 | past
Firmware Dumping Technique for an ARM Cortex-M0 SoC (includesecurity.com)
2 points by 2bluesc on Nov 16, 2015 | past
A light-weight forensic analysis of the AshleyMadison Hack (includesecurity.com)
3 points by aburan28 on Aug 20, 2015 | past | 1 comment
Reversing the Dropcam Part 1: Wireless and network communications (includesecurity.com)
1 point by ASUmusicMAN on Feb 8, 2015 | past
Reversing the Dropcam Part 3: Digging into Complied Lua Functionality (includesecurity.com)
1 point by ASUmusicMAN on Feb 8, 2015 | past
Reversing the Dropcam Part 2: Rooting Your Dropcam (includesecurity.com)
12 points by hippich on Dec 20, 2014 | past
Exploiting CVE-2014-0196 a walk-through of the Linux pty race condition PoC (includesecurity.com)
1 point by AndreyKarpov on June 4, 2014 | past
Rooting your Dropcam (includesecurity.com)
1 point by sizzle on June 2, 2014 | past | 1 comment
How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038 (includesecurity.com)
24 points by signa11 on March 7, 2014 | past | 3 comments
How I was able to track the location of any Tinder user (includesecurity.com)
180 points by rkudeshi on Feb 19, 2014 | past | 70 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: