For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Cross-Site WebSocket Hijacking Exploitation in 2025
(
includesecurity.com
)
5 points
by
ErikCabetas
11 months ago
|
past
|
1 comment
Memory Corruption in Delphi
(
includesecurity.com
)
3 points
by
todsacerdoti
on March 14, 2025
|
past
|
3 comments
Spelunking in Comments and Documentation for Security Footguns
(
includesecurity.com
)
4 points
by
hyper_reality
on Nov 20, 2024
|
past
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster
(
includesecurity.com
)
3 points
by
wslh
on May 3, 2024
|
past
|
1 comment
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster
(
includesecurity.com
)
1 point
by
todsacerdoti
on April 25, 2024
|
past
Discovering Deserialization Gadget Chains in Rubyland
(
includesecurity.com
)
2 points
by
pentestercrab
on March 14, 2024
|
past
Hunting for Mass Assignment Vulnerabilities Using GitHub CodeSearch and Grep.app
(
includesecurity.com
)
3 points
by
Rendello
on Sept 21, 2022
|
past
Drive by Compromise: A Tale of Four WiFi Routers
(
includesecurity.com
)
3 points
by
narukh
on Oct 4, 2021
|
past
Dependency Confusion Vulnerabilities in Unity Game Development
(
includesecurity.com
)
1 point
by
ykat7
on May 1, 2021
|
past
Custom Static Analysis Rules Showdown: Brakeman vs. Semgrep
(
includesecurity.com
)
3 points
by
ievans
on Jan 20, 2021
|
past
Firmware dumping technique for an ARM Cortex-M0 SoC (2015)
(
includesecurity.com
)
2 points
by
debevv
on July 23, 2018
|
past
Firmware Dumping Technique for an ARM Cortex-M0 SoC
(
includesecurity.com
)
2 points
by
2bluesc
on Nov 16, 2015
|
past
A light-weight forensic analysis of the AshleyMadison Hack
(
includesecurity.com
)
3 points
by
aburan28
on Aug 20, 2015
|
past
|
1 comment
Reversing the Dropcam Part 1: Wireless and network communications
(
includesecurity.com
)
1 point
by
ASUmusicMAN
on Feb 8, 2015
|
past
Reversing the Dropcam Part 3: Digging into Complied Lua Functionality
(
includesecurity.com
)
1 point
by
ASUmusicMAN
on Feb 8, 2015
|
past
Reversing the Dropcam Part 2: Rooting Your Dropcam
(
includesecurity.com
)
12 points
by
hippich
on Dec 20, 2014
|
past
Exploiting CVE-2014-0196 a walk-through of the Linux pty race condition PoC
(
includesecurity.com
)
1 point
by
AndreyKarpov
on June 4, 2014
|
past
Rooting your Dropcam
(
includesecurity.com
)
1 point
by
sizzle
on June 2, 2014
|
past
|
1 comment
How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038
(
includesecurity.com
)
24 points
by
signa11
on March 7, 2014
|
past
|
3 comments
How I was able to track the location of any Tinder user
(
includesecurity.com
)
180 points
by
rkudeshi
on Feb 19, 2014
|
past
|
70 comments
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.