Hacker Newsnew | past | comments | ask | show | jobs | submit | 1nvalid's submissionslogin
1.Black Friday 2022 Infosec Deals (github.com/0x90n)
1 point by 1nvalid on Nov 22, 2022 | past
2.India’s former foreign minister, Sushma Swaraj, dies at 67 (washingtonpost.com)
3 points by 1nvalid on Aug 6, 2019 | past
3.Awesome Cloudflare (github.com/irazasyed)
3 points by 1nvalid on June 24, 2019 | past
4.AWS API Gateway management tool for unique IP rotation proxy (github.com/ustayready)
1 point by 1nvalid on April 5, 2019 | past
5.Automatic SSRF fuzzer and exploitation tool (github.com/swisskyrepo)
1 point by 1nvalid on April 5, 2019 | past
6.Automated offensive security tool for reconnaissance and vulnerability scanning (github.com/j3ssie)
2 points by 1nvalid on April 5, 2019 | past
7.Wipe and reinstall a running Linux system via SSH (2017) (github.com/marcan)
399 points by 1nvalid on March 11, 2019 | past | 79 comments
8.Reviewing Modern JavaScript Applications (slideshare.net)
7 points by 1nvalid on March 9, 2019 | past
9.Automated Security Analysis of AWS Cloud (speakerdeck.com)
1 point by 1nvalid on March 9, 2019 | past
10.The bank for the best high school hackathons in the world (hackclub.com)
2 points by 1nvalid on March 9, 2019 | past | 1 comment
11.Why BlackBerry's Acquisition of Cylance Makes Sense (forbes.com/sites/greatspeculations)
1 point by 1nvalid on Feb 24, 2019 | past
12.Detecting Pass-The-hash with Honeypots (stealthbits.com)
1 point by 1nvalid on Feb 13, 2019 | past
13.How to Detect Pass-The-Hash Attacks (stealthbits.com)
3 points by 1nvalid on Feb 13, 2019 | past
14.Pass the Hash attack explained (stealthbits.com)
1 point by 1nvalid on Feb 13, 2019 | past
15.Linux Reverse Engineering CTFs for Beginners (osandamalith.com)
286 points by 1nvalid on Feb 13, 2019 | past | 31 comments
16.DNSGrep – Quickly Searching Large DNS Datasets (erbbysam.com)
1 point by 1nvalid on Feb 13, 2019 | past
17.Handling 1M websocket connections in Go (github.com/eranyanay)
207 points by 1nvalid on Feb 13, 2019 | past | 63 comments
18.Clean public password dump files and store in ELK (github.com/outflanknl)
1 point by 1nvalid on Feb 13, 2019 | past
19.Red Team's SIEM (github.com/outflanknl)
137 points by 1nvalid on Feb 13, 2019 | past | 26 comments
20.Mirror on the Wall Using Blue Team Techniques in RedTeam Ops [pdf] (github.com/outflanknl)
2 points by 1nvalid on Feb 13, 2019 | past
21.CVE search (cve-search.org)
2 points by 1nvalid on Feb 13, 2019 | past
22.Security.txt (2017) (securitytxt.org)
161 points by 1nvalid on Feb 13, 2019 | past | 54 comments
23.Ask HN: Share your experience starting your startup/current job
1 point by 1nvalid on Feb 9, 2019 | past
24.Exploiting Malwarebytes Anti-Exploit (acru3l.github.io)
1 point by 1nvalid on Feb 8, 2019 | past
25.Nginx quick reference (github.com/trimstray)
172 points by 1nvalid on Feb 8, 2019 | past | 19 comments
26.Beebug – A tool for checking exploitability (github.com/invictus1306)
4 points by 1nvalid on Feb 8, 2019 | past
27.Smart Contract (in)Security (nccgroup.trust)
2 points by 1nvalid on Feb 8, 2019 | past
28.Black-Box Container Security Auditing (nccgroup.trust)
1 point by 1nvalid on Feb 8, 2019 | past
29.Indian Government agencies now authorized to intercept electronic information (ndtv.com)
19 points by 1nvalid on Dec 21, 2018 | past
30.Mobile apps caught screen-grabbing user interactions (wired.co.uk)
1 point by 1nvalid on July 20, 2018 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: