Hacker Newsnew | past | comments | ask | show | jobs | submit | posthumangr's submissionslogin
1.First Open Source Arm V9 Motherboard (radxa.com)
2 points by posthumangr 11 months ago | past
2.MacStealer: Wi-Fi Client Isolation Bypass (github.com/vanhoefm)
2 points by posthumangr on March 30, 2023 | past | 1 comment
3.Public Penetration Testing Reports (github.com/juliocesarfort)
2 points by posthumangr on June 2, 2021 | past | 1 comment
4.The SolarWinds hackers aren’t back–they never went away (arstechnica.com)
3 points by posthumangr on June 2, 2021 | past
5.Analysis of Critical Vulnerabilities in the Windows TCP/IP Stack (armis.com)
3 points by posthumangr on May 5, 2021 | past
6.The United States government's just lost their case against Julian Assange (shadowproof.com)
3 points by posthumangr on Jan 4, 2021 | past | 1 comment
7.Ghidra: The Story of _check_SEC_cookie (mageirias.com)
1 point by posthumangr on Dec 7, 2020 | past
8.Interesting Laptop with 7 Screens (expanscape.com)
2 points by posthumangr on Nov 24, 2020 | past
9.Australian Osint Symposium (osintcombine.com)
2 points by posthumangr on Oct 6, 2020 | past | 1 comment
10.Malware Reverse Engineering Handbook (ccdcoe.org)
140 points by posthumangr on July 28, 2020 | past | 3 comments
11.Our team has been testing ProtonDrive internally (twitter.com/protonmail)
2 points by posthumangr on July 1, 2020 | past | 1 comment
12.China and Huawei propose reinvention of the internet (ft.com)
2 points by posthumangr on April 1, 2020 | past
13.Uncovering Openwrt Remote Code Execution (CVE-2020-7982) (forallsecure.com)
25 points by posthumangr on March 24, 2020 | past
14.Malware Analysis and Reverse Engineering Course (malware.re)
344 points by posthumangr on March 4, 2020 | past | 19 comments
15.Reverse Engineering a book cover (vulnsec.com)
1 point by posthumangr on Feb 8, 2017 | past
16.AnnealMail: post-quantum fork of Enigmail (annealmail.github.io)
1 point by posthumangr on Oct 19, 2016 | past
17.Wire Linux client (medium.com/wire-news)
1 point by posthumangr on Oct 13, 2016 | past
18.Why aren’t we using SSH for everything? (medium.com/swlh)
15 points by posthumangr on Oct 5, 2016 | past | 2 comments
19.TrackR Find Lost Items in Seconds (thetrackr.com)
1 point by posthumangr on Aug 12, 2016 | past
20.USENIX Enigma 2016 – The Golden Age of Bulk Surveillance (youtube.com)
3 points by posthumangr on Jan 29, 2016 | past
21.USENIX Enigma 2016 – NSA TAO Chief on Disrupting Nation State Hackers (youtube.com)
8 points by posthumangr on Jan 29, 2016 | past
22.Life with an OpenBSD Laptop [pdf] (nycbug.org)
2 points by posthumangr on Dec 29, 2015 | past
23.Cryptomator Security (cryptomator.org)
4 points by posthumangr on Dec 11, 2015 | past
24.ISIS Running 24-Hour Terrorist Crypto Help-Desk (darknet.org.uk)
1 point by posthumangr on Nov 19, 2015 | past
25.The US Navy's warfare systems command just paid millions to stay on Windows XP (networkworld.com)
7 points by posthumangr on June 23, 2015 | past | 2 comments
26.Automating remote BiOS attacks (boingboing.net)
1 point by posthumangr on March 21, 2015 | past
27.The shocking truth about police corruption in Britain (spectator.co.uk)
4 points by posthumangr on March 5, 2015 | past
28.DNS Census 2013 (dnscensus2013.neocities.org)
2 points by posthumangr on Nov 17, 2014 | past
29.The Dining Cryptographers Problem (1988) [pdf] (dropboxusercontent.com)
31 points by posthumangr on Nov 11, 2014 | past | 5 comments
30.Don't Fly Drones Here (mapbox.com)
61 points by posthumangr on Nov 8, 2014 | past | 31 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: