| | Cross-Site WebSocket Hijacking Exploitation in 2025 (includesecurity.com) |
|
5 points by ErikCabetas 24 days ago | past | 1 comment
|
| | Memory Corruption in Delphi (includesecurity.com) |
|
3 points by todsacerdoti 59 days ago | past | 3 comments
|
| | Spelunking in Comments and Documentation for Security Footguns (includesecurity.com) |
|
4 points by hyper_reality 5 months ago | past
|
| | Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com) |
|
3 points by wslh on May 3, 2024 | past | 1 comment
|
| | Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com) |
|
1 point by todsacerdoti on April 25, 2024 | past
|
| | Discovering Deserialization Gadget Chains in Rubyland (includesecurity.com) |
|
2 points by pentestercrab on March 14, 2024 | past
|
| | Hunting for Mass Assignment Vulnerabilities Using GitHub CodeSearch and Grep.app (includesecurity.com) |
|
3 points by Rendello on Sept 21, 2022 | past
|
| | Drive by Compromise: A Tale of Four WiFi Routers (includesecurity.com) |
|
3 points by narukh on Oct 4, 2021 | past
|
| | Dependency Confusion Vulnerabilities in Unity Game Development (includesecurity.com) |
|
1 point by ykat7 on May 1, 2021 | past
|
| | Custom Static Analysis Rules Showdown: Brakeman vs. Semgrep (includesecurity.com) |
|
3 points by ievans on Jan 20, 2021 | past
|
| | Firmware dumping technique for an ARM Cortex-M0 SoC (2015) (includesecurity.com) |
|
2 points by debevv on July 23, 2018 | past
|
| | Firmware Dumping Technique for an ARM Cortex-M0 SoC (includesecurity.com) |
|
2 points by 2bluesc on Nov 16, 2015 | past
|
| | A light-weight forensic analysis of the AshleyMadison Hack (includesecurity.com) |
|
3 points by aburan28 on Aug 20, 2015 | past | 1 comment
|
| | Reversing the Dropcam Part 1: Wireless and network communications (includesecurity.com) |
|
1 point by ASUmusicMAN on Feb 8, 2015 | past
|
| | Reversing the Dropcam Part 3: Digging into Complied Lua Functionality (includesecurity.com) |
|
1 point by ASUmusicMAN on Feb 8, 2015 | past
|
| | Reversing the Dropcam Part 2: Rooting Your Dropcam (includesecurity.com) |
|
12 points by hippich on Dec 20, 2014 | past
|
| | Exploiting CVE-2014-0196 a walk-through of the Linux pty race condition PoC (includesecurity.com) |
|
1 point by AndreyKarpov on June 4, 2014 | past
|
| | Rooting your Dropcam (includesecurity.com) |
|
1 point by sizzle on June 2, 2014 | past | 1 comment
|
| | How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038 (includesecurity.com) |
|
24 points by signa11 on March 7, 2014 | past | 3 comments
|
| | How I was able to track the ___location of any Tinder user (includesecurity.com) |
|
180 points by rkudeshi on Feb 19, 2014 | past | 70 comments
|