Hacker News new | past | comments | ask | show | jobs | submit | from login
Cross-Site WebSocket Hijacking Exploitation in 2025 (includesecurity.com)
5 points by ErikCabetas 24 days ago | past | 1 comment
Memory Corruption in Delphi (includesecurity.com)
3 points by todsacerdoti 59 days ago | past | 3 comments
Spelunking in Comments and Documentation for Security Footguns (includesecurity.com)
4 points by hyper_reality 5 months ago | past
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com)
3 points by wslh on May 3, 2024 | past | 1 comment
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com)
1 point by todsacerdoti on April 25, 2024 | past
Discovering Deserialization Gadget Chains in Rubyland (includesecurity.com)
2 points by pentestercrab on March 14, 2024 | past
Hunting for Mass Assignment Vulnerabilities Using GitHub CodeSearch and Grep.app (includesecurity.com)
3 points by Rendello on Sept 21, 2022 | past
Drive by Compromise: A Tale of Four WiFi Routers (includesecurity.com)
3 points by narukh on Oct 4, 2021 | past
Dependency Confusion Vulnerabilities in Unity Game Development (includesecurity.com)
1 point by ykat7 on May 1, 2021 | past
Custom Static Analysis Rules Showdown: Brakeman vs. Semgrep (includesecurity.com)
3 points by ievans on Jan 20, 2021 | past
Firmware dumping technique for an ARM Cortex-M0 SoC (2015) (includesecurity.com)
2 points by debevv on July 23, 2018 | past
Firmware Dumping Technique for an ARM Cortex-M0 SoC (includesecurity.com)
2 points by 2bluesc on Nov 16, 2015 | past
A light-weight forensic analysis of the AshleyMadison Hack (includesecurity.com)
3 points by aburan28 on Aug 20, 2015 | past | 1 comment
Reversing the Dropcam Part 1: Wireless and network communications (includesecurity.com)
1 point by ASUmusicMAN on Feb 8, 2015 | past
Reversing the Dropcam Part 3: Digging into Complied Lua Functionality (includesecurity.com)
1 point by ASUmusicMAN on Feb 8, 2015 | past
Reversing the Dropcam Part 2: Rooting Your Dropcam (includesecurity.com)
12 points by hippich on Dec 20, 2014 | past
Exploiting CVE-2014-0196 a walk-through of the Linux pty race condition PoC (includesecurity.com)
1 point by AndreyKarpov on June 4, 2014 | past
Rooting your Dropcam (includesecurity.com)
1 point by sizzle on June 2, 2014 | past | 1 comment
How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038 (includesecurity.com)
24 points by signa11 on March 7, 2014 | past | 3 comments
How I was able to track the ___location of any Tinder user (includesecurity.com)
180 points by rkudeshi on Feb 19, 2014 | past | 70 comments

Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: