| | Cross-Site WebSocket Hijacking Exploitation in 2025 (includesecurity.com) |
| 5 points by ErikCabetas 9 months ago | past | 1 comment |
|
| | Memory Corruption in Delphi (includesecurity.com) |
| 3 points by todsacerdoti 10 months ago | past | 3 comments |
|
| | Spelunking in Comments and Documentation for Security Footguns (includesecurity.com) |
| 4 points by hyper_reality on Nov 20, 2024 | past |
|
| | Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com) |
| 3 points by wslh on May 3, 2024 | past | 1 comment |
|
| | Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster (includesecurity.com) |
| 1 point by todsacerdoti on April 25, 2024 | past |
|
| | Discovering Deserialization Gadget Chains in Rubyland (includesecurity.com) |
| 2 points by pentestercrab on March 14, 2024 | past |
|
| | Hunting for Mass Assignment Vulnerabilities Using GitHub CodeSearch and Grep.app (includesecurity.com) |
| 3 points by Rendello on Sept 21, 2022 | past |
|
| | Drive by Compromise: A Tale of Four WiFi Routers (includesecurity.com) |
| 3 points by narukh on Oct 4, 2021 | past |
|
| | Dependency Confusion Vulnerabilities in Unity Game Development (includesecurity.com) |
| 1 point by ykat7 on May 1, 2021 | past |
|
| | Custom Static Analysis Rules Showdown: Brakeman vs. Semgrep (includesecurity.com) |
| 3 points by ievans on Jan 20, 2021 | past |
|
| | Firmware dumping technique for an ARM Cortex-M0 SoC (2015) (includesecurity.com) |
| 2 points by debevv on July 23, 2018 | past |
|
| | Firmware Dumping Technique for an ARM Cortex-M0 SoC (includesecurity.com) |
| 2 points by 2bluesc on Nov 16, 2015 | past |
|
| | A light-weight forensic analysis of the AshleyMadison Hack (includesecurity.com) |
| 3 points by aburan28 on Aug 20, 2015 | past | 1 comment |
|
| | Reversing the Dropcam Part 1: Wireless and network communications (includesecurity.com) |
| 1 point by ASUmusicMAN on Feb 8, 2015 | past |
|
| | Reversing the Dropcam Part 3: Digging into Complied Lua Functionality (includesecurity.com) |
| 1 point by ASUmusicMAN on Feb 8, 2015 | past |
|
| | Reversing the Dropcam Part 2: Rooting Your Dropcam (includesecurity.com) |
| 12 points by hippich on Dec 20, 2014 | past |
|
| | Exploiting CVE-2014-0196 a walk-through of the Linux pty race condition PoC (includesecurity.com) |
| 1 point by AndreyKarpov on June 4, 2014 | past |
|
| | Rooting your Dropcam (includesecurity.com) |
| 1 point by sizzle on June 2, 2014 | past | 1 comment |
|
| | How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038 (includesecurity.com) |
| 24 points by signa11 on March 7, 2014 | past | 3 comments |
|
| | How I was able to track the location of any Tinder user (includesecurity.com) |
| 180 points by rkudeshi on Feb 19, 2014 | past | 70 comments |
|