Dark Hacker News
new
|
best
|
ask
|
show
|
jobs
Megabeets | Dark Hacker News
user:
Megabeets
created:
March 13, 2018
karma:
300
submissions
comments
1.
Previously unknown spyware used in 0-day attacks on Samsung phones
(unit42.paloaltonetworks.com)
6 points
by
Megabeets
191 days ago
|
1 comment
2.
Attributing State-Sponsored Hacktivist Groups with Stylometry and Topic Modeling
(research.checkpoint.com)
2 points
by
Megabeets
1 year ago
|
1 comment
3.
A Deep Dive into a Chinese Apt Group's TP-Link Router Implant
(research.checkpoint.com)
30 points
by
Megabeets
3 years ago
|
0 comments
4.
Microsoft Patched Critical RCE Vulnerability in MSMQ Service
(research.checkpoint.com)
2 points
by
Megabeets
3 years ago
|
0 comments
5.
Indra – Hackers Behind Recent Attacks on Iran Railways and Government
(research.checkpoint.com)
2 points
by
Megabeets
4 years ago
|
0 comments
6.
Google says it’s too easy for hackers to find new security flaws
(technologyreview.com)
2 points
by
Megabeets
5 years ago
|
0 comments
7.
Jian – How the Chinese APT31 stole and used an unknown Equation Group 0-Day
(research.checkpoint.com)
32 points
by
Megabeets
5 years ago
|
6 comments
8.
5 years ago
|
discuss
9.
The NSA just released the preview version of Ghidra Debugger on GitHub
(github.com)
1 points
by
Megabeets
5 years ago
|
discuss
10.
Rizin – open-source Reverse Engineering framework forked from radare2
(rizin.re)
42 points
by
Megabeets
5 years ago
|
9 comments
11.
Hunting for exploits based on the developer's fingerprints
(research.checkpoint.com)
3 points
by
Megabeets
5 years ago
|
0 comments
12.
C implementation of Tic-Tac-Toe in a single call to printf
(github.com)
377 points
by
Megabeets
5 years ago
|
82 comments
13.
“From Prison to Python” – a life story about crime, prison and open-source
(youtube.com)
1 points
by
Megabeets
5 years ago
|
0 comments
14.
Stay Motivated When Feedback Is Scarce
(hbr.org)
1 points
by
Megabeets
5 years ago
|
0 comments
15.
Nazar: Analyzing malware that was uncovered in leaked NSA files
(research.checkpoint.com)
198 points
by
Megabeets
6 years ago
|
28 comments
16.
Chinese cyberattack against Mongolia takes advantage of Covid-19 to lure victims
(research.checkpoint.com)
4 points
by
Megabeets
6 years ago
|
0 comments
17.
Malware Evasion Encyclopedia – Over 50 techniques to detect sandbox and VMs
(evasions.checkpoint.com)
3 points
by
Megabeets
6 years ago
|
0 comments
18.
Mapping code-connections between thousands of Russian APT malware samples
(research.checkpoint.com)
2 points
by
Megabeets
6 years ago
|
0 comments
19.
GitHub finally allows you to assign issues to non-collaborators
(help.github.com)
3 points
by
Megabeets
6 years ago
|
0 comments
20.
macOS Malware Encyclopedia is out
(macos.checkpoint.com)
2 points
by
Megabeets
7 years ago
|
0 comments
21.
Fantastic Malware and Where to Find Them
(megabeets.net)
2 points
by
Megabeets
7 years ago
|
0 comments
22.
Reversing a Self-Modifying Binary with radare2
(megabeets.net)
1 points
by
Megabeets
8 years ago
|
0 comments