Hacker Newsnew | past | comments | ask | show | jobs | submit | notmine1337's submissionslogin
1.Drawbot: Let's hack something cute (2025) (atredis.com)
35 points by notmine1337 13 days ago | past | 5 comments
2.Opening the AWS European Sovereign Cloud (amazon.com)
66 points by notmine1337 14 days ago | past | 72 comments
3.Releasing Rainbow Tables to Accelerate Net-NTLMv1 Protocol Deprecation (cloud.google.com)
4 points by notmine1337 14 days ago | past
4.Petlibro: Pet Feeder Is Feeding Data to Anyone Who Asks (bobdahacker.com)
3 points by notmine1337 33 days ago | past
5.Reverse Engineering a Phase Change in GPT with the Seahorse Emoji (pratyushmaini.substack.com)
1 point by notmine1337 40 days ago | past
6.Pixel phone can now be used as a webcam for the Nintendo Switch 2 (androidauthority.com)
2 points by notmine1337 55 days ago | past
7.About Signal Pin (s1m.fr)
2 points by notmine1337 62 days ago | past
8.Drawbot: Let's hack something cute (atredis.com)
3 points by notmine1337 77 days ago | past | 1 comment
9.New spyware exploited a Samsung 0-day delivered through WhatsApp messages (paloaltonetworks.com)
4 points by notmine1337 83 days ago | past | 1 comment
10.Hacking the World Poker Tour: Inside ClubWPT Gold's Back Office (samcurry.net)
38 points by notmine1337 3 months ago | past | 10 comments
11.Exploring GrapheneOS secure allocator: Hardened Malloc (synacktiv.com)
3 points by notmine1337 4 months ago | past
12.Exploiting the GPU and the 90s crypto wars to crack the APT code signing keys (put.as)
4 points by notmine1337 4 months ago | past
13.All You Need Is MCP – LLMs Solving a DEF Con CTF Finals Challenge (wilgibbs.com)
1 point by notmine1337 4 months ago | past
14.How the “Kim” dump exposed North Korea's credential theft playbook (domaintools.com)
405 points by notmine1337 4 months ago | past | 181 comments
15.Painting stolen by Nazis believed discovered in Argentine real estate listing (nbcnews.com)
2 points by notmine1337 5 months ago | past | 1 comment
16.BadCam: Turning Linux webcams into BadUSB attack tools (eclypsium.com)
2 points by notmine1337 5 months ago | past
17.Hacking every Intel employee and various internal websites (eaton-works.com)
4 points by notmine1337 5 months ago | past | 1 comment
18.Deleting a file in Wire doesn't remove it from servers – and other findings (almond.consulting)
2 points by notmine1337 7 months ago | past
19.Decrypting Encrypted files from Akira Ransomware using a bunch of GPUs (tinyhack.com)
6 points by notmine1337 10 months ago | past | 1 comment
20.The ESP32 "backdoor" that wasn't (darkmentor.com)
29 points by notmine1337 10 months ago | past | 7 comments
21.Reinventing PowerShell in C/C++ (scrt.ch)
2 points by notmine1337 11 months ago | past
22.We Hacked a Software Supply Chain for $50K (landh.tech)
4 points by notmine1337 11 months ago | past
23.Push Notifications for Decentralized Services (unifiedpush.org)
164 points by notmine1337 12 months ago | past | 52 comments
24.Laser Fault Injection on a Budget: RP2350 Edition (courk.cc)
40 points by notmine1337 on Jan 15, 2025 | past | 4 comments
25.WorstFit: Unveiling Hidden Transformers in Windows ANSI (blog.orange.tw)
373 points by notmine1337 on Jan 9, 2025 | past | 178 comments
26.Backdooring your backdoors – Another $20 domain, more governments (watchtowr.com)
14 points by notmine1337 on Jan 8, 2025 | past | 2 comments
27.Using AFL++ on bug bounty programs: an example with Gnome libsoup (almond.consulting)
1 point by notmine1337 on Oct 30, 2024 | past
28.CVE-2024-45844: Privilege escalation in F5 BIG-IP (almond.consulting)
12 points by notmine1337 on Oct 25, 2024 | past
29.Tinkerers Are Taking Old Redbox Kiosks Home and Reverse Engineering Them (404media.co)
3 points by notmine1337 on Oct 16, 2024 | past
30.CVE-2024-23113 a Super Complex Vulnerability in a Super Secure Appliance in 2024 (watchtowr.com)
3 points by notmine1337 on Oct 14, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: