Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Bypassing Basic Authentication in PHP Applications (armoredcode.com)
1 point by jszymborski on Nov 6, 2014 | past
I don't care if app is unsecure, it's friday I'm in love" (armoredcode.com)
2 points by thesp0nge on April 19, 2013 | past
CVE-2012-5664: Sql Injection on Rails... again (armoredcode.com)
1 point by thesp0nge on Jan 4, 2013 | past
Driven by real world task: code reviewing JSP using ruby regular expressions (armoredcode.com)
1 point by thesp0nge on Dec 4, 2012 | past
Integrate Padrino, Omniauth and github (armoredcode.com)
1 point by thesp0nge on Nov 21, 2012 | past
Border line between marketing and security features (armoredcode.com)
1 point by thesp0nge on Nov 5, 2012 | past
The hidden pitfalls in automatic source code review (armoredcode.com)
3 points by thesp0nge on Oct 29, 2012 | past
Adding basic authentication support to wpscan (armoredcode.com)
1 point by thesp0nge on Oct 23, 2012 | past
Armorize Your Rack Stacktrace for Debug Purposes (armoredcode.com)
1 point by thesp0nge on Aug 14, 2012 | past
5 Excuses You Won't Tell Your Self for Not Practicing TDD (armoredcode.com)
1 point by thesp0nge on July 26, 2012 | past | 2 comments
Build an API for Fun With Grape (armoredcode.com)
1 point by thesp0nge on July 24, 2012 | past
Fingerprinting CMSes Under the Moonlight (armoredcode.com)
1 point by thesp0nge on July 16, 2012 | past
Testing Your Cookie's Attributes for Insecurities Using Ruby (armoredcode.com)
1 point by thesp0nge on July 5, 2012 | past
Some Security Tips for Ruby Hackers: Leveraging the Attack Surface: Part 2 (armoredcode.com)
1 point by thesp0nge on June 27, 2012 | past
What I Learnt From Italian RubyDay (armoredcode.com)
2 points by thesp0nge on June 15, 2012 | past
LeakedIN and the Salt and Pepper Sauce (armoredcode.com)
1 point by thesp0nge on June 8, 2012 | past
CVE-2012-2661: SqlInjection on Rails (armoredcode.com)
1 point by thesp0nge on June 7, 2012 | past
Am I the Sandman? (armoredcode.com)
1 point by vgnet on May 31, 2012 | past
Ghost in the Shell: An Exploiting Attempt Examinated (armoredcode.com)
2 points by thesp0nge on May 23, 2012 | past
Using Design by Contract and TDD to Enforce Security: The Coat Project (armoredcode.com)
1 point by thesp0nge on May 16, 2012 | past
Is Design by Contract the Solution for Safe Coding? (armoredcode.com)
2 points by thesp0nge on May 10, 2012 | past
[Hackers Work] - Interview with Simon Bennetts: Owasp Zap Project Leader (armoredcode.com)
1 point by thesp0nge on May 4, 2012 | past
Open the Code or Review It: Oracle CVE-2012-1675 (armoredcode.com)
1 point by thesp0nge on May 2, 2012 | past
Bypassing HTTP Basic Authentication in PHP Applications (armoredcode.com)
5 points by thesp0nge on April 26, 2012 | past | 6 comments
H4F - Invisible Proxy... Casper Gem (armoredcode.com)
1 point by thesp0nge on April 23, 2012 | past
Papa Don't Breach (armoredcode.com)
1 point by thesp0nge on April 10, 2012 | past
H4F - Use robots.txt as a Weapon With Links Rubygem (armoredcode.com)
2 points by thesp0nge on April 6, 2012 | past
H4F - Palco: Your Sinatra Skeleton Builder (armoredcode.com)
1 point by thesp0nge on March 30, 2012 | past
Understanding Your Attack Exposure (armoredcode.com)
3 points by thesp0nge on March 21, 2012 | past
Even Before Your Secure Coding... Patch Your Server (armoredcode.com)
3 points by thesp0nge on March 19, 2012 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: