Dark Hacker News
new
|
best
|
ask
|
show
|
jobs
archimag0 | Dark Hacker News
user:
archimag0
created:
April 30, 2015
karma:
561
submissions
comments
1.
Why the Computer Chose Cancun (1972)
(nytimes.com)
1 points
by
archimag0
2 years ago
|
0 comments
2.
Compromising Honda’s dealer platform through a vulnerable password reset API
(eaton-works.com)
1 points
by
archimag0
2 years ago
|
0 comments
3.
Vulnerability in TikTok Android app could lead to one-click account hijacking
(microsoft.com)
3 points
by
archimag0
3 years ago
|
0 comments
4.
Druva InSync for Mac Local Privilege Escalation
(imhotepisinvisible.com)
1 points
by
archimag0
3 years ago
|
0 comments
5.
A story of leaking uninitialized memory from Fastly
(medium.com)
3 points
by
archimag0
4 years ago
|
0 comments
6.
Lessons learned from 15 years of SumatraPDF, an open source Windows app
(blog.kowalczyk.info)
350 points
by
archimag0
4 years ago
|
133 comments
7.
Stripe Saw Major Uptake of Staff Offer to Move with 10% Pay Cut
(bloomberg.com)
33 points
by
archimag0
4 years ago
|
7 comments
8.
I Hacked Google App Engine: Anatomy of a Java Bytecode Exploit
(blog.polybdenum.com)
3 points
by
archimag0
5 years ago
|
0 comments
9.
Attacking the Qualcomm Adreno GPU
(googleprojectzero.blogspot.com)
63 points
by
archimag0
5 years ago
|
22 comments
10.
FF Sandbox Escape (CVE-2020-12388)
(googleprojectzero.blogspot.com)
3 points
by
archimag0
5 years ago
|
0 comments
11.
An EL1/EL3 coldboot vulnerability affecting 7 years of LG Android devices
(douevenknow.us)
1 points
by
archimag0
5 years ago
|
0 comments
12.
Samsung Android multiple interactionless RCEs
(bugs.chromium.org)
3 points
by
archimag0
6 years ago
|
0 comments
13.
CryptoHack: A fun platform for learning cryptography
(cryptohack.org)
4 points
by
archimag0
6 years ago
|
0 comments
14.
Mitigations are attack surface, too
(googleprojectzero.blogspot.com)
104 points
by
archimag0
6 years ago
|
22 comments
15.
Several months in the life of Project Zero – Part 1: The Chrome bug of suffering
(googleprojectzero.blogspot.com)
140 points
by
archimag0
6 years ago
|
27 comments
16.
Turn-by-turntables: How drivers got from point A to point B in the early 1900s
(arstechnica.com)
81 points
by
archimag0
6 years ago
|
21 comments
17.
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
(googleprojectzero.blogspot.com)
3 points
by
archimag0
6 years ago
|
0 comments
18.
KTRW: The Journey to Build a Debuggable iPhone
(googleprojectzero.blogspot.com)
77 points
by
archimag0
6 years ago
|
25 comments
19.
Compromising online accounts by cracking voicemail systems
(martinvigo.com)
47 points
by
archimag0
6 years ago
|
9 comments
20.
Windows Exploitation Tricks: Abusing the User-Mode Debugger
(googleprojectzero.blogspot.com)
70 points
by
archimag0
6 years ago
|
10 comments
21.
Windows Exploitation Tricks: Abusing the User-Mode Debugger
(googleprojectzero.blogspot.com)
3 points
by
archimag0
7 years ago
|
0 comments
22.
Evilginx2: Standalone man-in-the-middle attack framework
(github.com)
54 points
by
archimag0
7 years ago
|
7 comments
23.
Deja-XNU
(googleprojectzero.blogspot.com)
2 points
by
archimag0
7 years ago
|
0 comments
24.
Compromising online accounts by cracking voicemail systems
(martinvigo.com)
8 points
by
archimag0
7 years ago
|
0 comments
25.
The Game of Everything, Part 4: Civilization and Geography
(filfre.net)
2 points
by
archimag0
8 years ago
|
0 comments
26.
A Few Notes on Medsec and St. Jude Medical
(blog.cryptographyengineering.com)
2 points
by
archimag0
8 years ago
|
0 comments
27.
Can A.I. Be Taught to Explain Itself?
(nytimes.com)
3 points
by
archimag0
8 years ago
|
0 comments
28.
Exploiting the Wi-Fi Stack on Apple Devices
(googleprojectzero.blogspot.com)
347 points
by
archimag0
8 years ago
|
83 comments
29.
Aes Gcm Speedup
(franziskuskiefer.de)
2 points
by
archimag0
8 years ago
|
0 comments