Hacker News new | past | comments | ask | show | jobs | submit | from login
Compromising Rspack Using GitHub Actions (praetorian.com)
1 point by arshxyz 5 months ago | past
Obtaining Remote Code Execution in F5-Bigip via AJP Request Smuggling (praetorian.com)
1 point by bouncyhat on Oct 26, 2023 | past | 1 comment
Technical Advisory – Azure B2C – Crypto Misuse and Account Compromise (praetorian.com)
2 points by PretzelFisch on Feb 25, 2023 | past
Azure B2C – Crypto Misuse and Account Compromise (praetorian.com)
1 point by Terretta on Feb 19, 2023 | past
Uncontrollable AWS IAM: Sts:GetSessionToken, GetCallerIdentity, and Policy Sim (praetorian.com)
2 points by nutbear on June 17, 2022 | past
Spring Core on JDK9 is vulnerable to remote code execution (praetorian.com)
157 points by groundshark on March 30, 2022 | past | 70 comments
Nosey Parker: An AI Based Secrets Scanner That Out Sniffs the Competition (praetorian.com)
5 points by twoshores67 on March 22, 2022 | past
GoKart, a Smarter Go Security Scanner (praetorian.com)
2 points by ngaut on Aug 23, 2021 | past
GoKart (praetorian.com)
1 point by InitialBP on Aug 19, 2021 | past
Bypassing Google's Santa Application Whitelisting on macOS (#hacking) (praetorian.com)
1 point by myover on June 12, 2019 | past
Cloud Data Exfiltration via GCP Storage Buckets and How to Prevent It (praetorian.com)
1 point by myover on June 6, 2019 | past
What we learned from 100 Pen Tests, 75 Organizations, 450 Attack Vectors [pdf] (praetorian.com)
1 point by myover on Sept 2, 2016 | past
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com)
3 points by ashitlerferad on June 4, 2016 | past
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com)
1 point by ndesaulniers on June 3, 2016 | past
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com)
2 points by myover on June 2, 2016 | past
11 Steps to Mitigate WPAD Attack (Defense In-depth) (praetorian.com)
1 point by jabraham_ on May 25, 2016 | past
Signal Protocol and Deniable Authentication (praetorian.com)
3 points by kkl on May 17, 2016 | past
Great Example of an Engineering Culture at Work in Security Services (praetorian.com)
1 point by myover on April 26, 2016 | past
JTAGulator vs. JTAGenum, Hardware Hacking Tools for IoT Devices (praetorian.com)
2 points by myover on April 20, 2016 | past
SPAM Filters: A Reliable Protection Against Phishing Attacks? (praetorian.com)
4 points by myover on April 12, 2016 | past
End-To-End WhatsApp Encryption: Why Signal Protocol Is So Well-Designed (praetorian.com)
6 points by myover on April 7, 2016 | past
Machine Learning Tutorial (praetorian.com)
4 points by myover on Feb 15, 2016 | past | 2 comments
Statistics Based Password Cracking Rules Released (praetorian.com)
4 points by myover on Feb 11, 2016 | past
Ruby Unsafe Reflection Vulnerabilities (praetorian.com)
1 point by myover on Feb 9, 2016 | past
Introducing Gladius: Automatic Responder Cracking for Internal Pentests (praetorian.com)
5 points by myover on Feb 4, 2016 | past
Introducing MitM-VM and Trudy… a Dead Simple TCP Intercepting Proxy Tool Set (praetorian.com)
4 points by myover on Feb 2, 2016 | past
IPv6 Has Arrived – Is Your Security Infrastructure Prepared? (praetorian.com)
2 points by myover on Jan 28, 2016 | past
The Reason My Lamp Is Insecure (praetorian.com)
3 points by myover on Jan 26, 2016 | past
Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1 (praetorian.com)
3 points by myover on Jan 23, 2016 | past
JavaScript Sensor API and New Browser Features Raise Privacy Concerns (praetorian.com)
6 points by myover on Jan 19, 2016 | past

Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: