Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Civilian hackers in China's military cyber strategy (margin.re)
16 points by aaronsdevera 4 months ago | past
You Can't Spell WebRTC Without RCE – Part 1 (margin.re)
58 points by ementally on Aug 4, 2024 | past | 10 comments
Disassembling Dalvik (margin.re)
43 points by kc0bfv on May 29, 2024 | past | 3 comments
Same Same, but Different (margin.re)
4 points by notmine1337 on Feb 29, 2024 | past
Emulating and Exploiting UEFI Firmware (margin.re)
5 points by withzombies on Oct 2, 2023 | past
Analyzing Russian Internet Firm Yandex, Its Open-Source Code, and Contributors (margin.re)
2 points by aaronsdevera on March 28, 2023 | past
Pulling MikroTik into the Limelight Demystifying and Jailbreaking RouterS (margin.re)
135 points by 882542F3884314B on Dec 8, 2022 | past | 57 comments
Russia’s Open-Source Code and Private-Sector Cybersecurity Ecosystem (margin.re)
1 point by aaronsdevera on Nov 10, 2022 | past
Pulling MikroTik into the Limelight (margin.re)
63 points by transpute on June 15, 2022 | past | 2 comments
Jailbreaking MikroTik RouterOS (margin.re)
7 points by aaronsdevera on June 14, 2022 | past
Cannoli: The Fast QEMU Tracer (margin.re)
106 points by zdw on May 27, 2022 | past | 6 comments
Watching the Watchers: Analyzing corporate automated bug reporters in Linux (margin.re)
2 points by withzombies on April 6, 2022 | past
MikroTik authentication revealed (margin.re)
180 points by aaronsdevera on Feb 14, 2022 | past | 49 comments
MikroTik Authentication Revealed (margin.re)
4 points by cpach on Feb 11, 2022 | past
An opinionated guide on how to reverse engineer software (margin.re)
375 points by withzombies on Nov 2, 2021 | past | 44 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: