Created
March 3, 2020 07:02
-
-
Save breadchris/525a33a376565cc85595dda435abab38 to your computer and use it in GitHub Desktop.
pocket backup
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html> | |
<html> | |
<!--So long and thanks for all the fish--> | |
<head> | |
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | |
<title>Pocket Export</title> | |
</head> | |
<body> | |
<h1>Unread</h1> | |
<ul> | |
<li><a href="https://www.indiehackers.com/post/how-to-brainstorm-great-business-ideas-ab51c3d51c" time_added="1582932826" tags="">How to brainstorm great business ideas</a></li> | |
<li><a href="https://www.linaro.org/blog/the-end-of-an-era/" time_added="1581190102" tags="">The end of an Era - Linaro</a></li> | |
<li><a href="https://joellaity.com/2020/01/31/string.html" time_added="1580758640" tags="">libc ’s implementation of std::string | Joel Laity</a></li> | |
<li><a href="https://www.vitoliuzzi.com/app/download/7856258261/the_best_of_victor_wooten.pdf?t=1557927056" time_added="1579813434" tags="">https://www.vitoliuzzi.com/app/download/7856258261/the_best_of_victor_wooten.pdf?t=1557927056</a></li> | |
<li><a href="https://www.notreble.com/buzz/2015/08/20/bass-transcription-joe-darts-bass-line-on-vulfpecks-beastly/" time_added="1579734799" tags="">Bass Transcription: Joe Dart’s Bass Line on Vulfpeck’s “Beastly” – No Trebl</a></li> | |
<li><a href="https://www.simform.com/serverless-examples-aws-lambda-use-cases/" time_added="1579301118" tags="aws,lambda">10 AWS Lambda Use Cases to Start Your Serverless Journey</a></li> | |
<li><a href="https://blog.cryptographyengineering.com/" time_added="1579224861" tags="">A Few Thoughts on Cryptographic Engineering – Some random thoughts about cr</a></li> | |
<li><a href="https://www.thekitchn.com/costco-meal-plan-265010" time_added="1579045313" tags="">How I Prep Two Weeks' Worth of Costco Meals | Kitchn</a></li> | |
<li><a href="https://queue.acm.org/detail.cfm?id=3375635" time_added="1577069512" tags="">https://queue.acm.org/detail.cfm?id=3375635</a></li> | |
<li><a href="https://www.beyondlogic.org/usbnutshell/usb1.shtml" time_added="1576430759" tags="">article-mobile.html</a></li> | |
<li><a href="https://goelhardik.github.io/2016/10/04/fishers-lda/" time_added="1576274218" tags="">Implementing Fisher’s LDA from scratch in Python · Hardik Goel</a></li> | |
<li><a href="https://goelhardik.github.io/2017/02/15/extracting-data-from-hackernews/" time_added="1576274212" tags="">Extracting data from HackerNews using Firebase API in Python · Hardik Goel</a></li> | |
<li><a href="https://arxiv.org/pdf/1809.01771.pdf" time_added="1576260238" tags="">1809.01771.pdf</a></li> | |
<li><a href="https://www.thinkinfi.com/2019/08/LDA-Gensim-Python.html" time_added="1576258807" tags="">Guide to Build Best LDA model using Gensim Python - Think Infi</a></li> | |
<li><a href="https://stackabuse.com/implementing-lda-in-python-with-scikit-learn/" time_added="1576258804" tags="">Implementing LDA in Python with Scikit-Learn</a></li> | |
<li><a href="http://ericvh.github.io/9p-rfc/rfc9p2000.html" time_added="1575657054" tags="">Plan 9 Remote Resource Protocol</a></li> | |
<li><a href="http://www.unofficialgoogledatascience.com/2016/10/practical-advice-for-analysis-of-large.html" time_added="1574918450" tags="">article-mobile.html</a></li> | |
<li><a href="https://www.youtube.com/watch?v=NmpnGhRwsu0" time_added="1574396723" tags="">article-mobile.html</a></li> | |
<li><a href="https://www.nylas.com/blog/packaging-deploying-python/" time_added="1574296899" tags="">How We Deploy Python Code | Nylas</a></li> | |
<li><a href="https://travisdowns.github.io/blog/2019/11/19/toupper.html" time_added="1574275342" tags="">Clang-format tanks performance | Performance Matters</a></li> | |
<li><a href="https://www.fullstackpython.com/" time_added="1574126892" tags="">Full Stack Python</a></li> | |
<li><a href="https://pomb.us/build-your-own-react/" time_added="1573758085" tags="">Build your own React</a></li> | |
<li><a href="https://medium.com/@oyewusiwuraola/exploring-topic-modelling-with-gensim-on-the-essential-science-indicators-journals-list-1dc4d9f96d9c" time_added="1573527665" tags="">Exploring Topic Modelling with Gensim on the Essential Science Indicators J</a></li> | |
<li><a href="https://ethz.ch/content/dam/ethz/special-interest/infk/chair-program-method/pm/documents/Education/Theses/Flurin_Rindisbacher_MA_report.pdf" time_added="1573506192" tags="">Flurin_Rindisbacher_MA_report.pdf</a></li> | |
<li><a href="https://courses.cs.washington.edu/courses/cse501/15sp/" time_added="1573506058" tags="">CSE 501: Principles and Applications of Program Analysis</a></li> | |
<li><a href="https://tel.archives-ouvertes.fr/tel-01769981/document" time_added="1573505890" tags="">Static analysis by abstract interpretation of functional temporal propertie</a></li> | |
<li><a href="http://www-verimag.imag.fr/PUBLIS/uploads/ipogm3582.pdf" time_added="1573505726" tags="">ipogm3582.pdf</a></li> | |
<li><a href="https://www.msreverseengineering.com/blog/2018/2/26/concrete-and-abstract-interpretation-explained-through-chess" time_added="1573505537" tags="">Concrete and Abstract Interpretation, Explained through Chess — Möbius Stri</a></li> | |
<li><a href="http://web.mit.edu/afs/athena.mit.edu/course/16/16.399/www/" time_added="1573505408" tags="">MIT Course 16.399: « Abstract Interpretation » Home Page</a></li> | |
<li><a href="https://xiph.org/video/vid1.shtml" time_added="1573354052" tags="">Xiph.Org Video Presentations: A Digital Media Primer for Geeks</a></li> | |
<li><a href="https://www.cs.tau.ac.il/~msagiv/courses/software-productivity.html" time_added="1573166847" tags="">https://www.cs.tau.ac.il/~msagiv/courses/software-productivity.html</a></li> | |
<li><a href="https://www.cs.tau.ac.il/~msagiv/courses/pa16.html#examples" time_added="1573166770" tags="">https://www.cs.tau.ac.il/~msagiv/courses/pa16.html#examples</a></li> | |
<li><a href="https://www.cs.tau.ac.il/~msagiv/" time_added="1573166656" tags="">Mooly (Shmuel) Sagiv</a></li> | |
<li><a href="http://ropas.snu.ac.kr/~kwang/talk/ssft19.pdf" time_added="1573165967" tags="">ssft19.pdf</a></li> | |
<li><a href="https://homepage.cs.uiowa.edu/~tinelli/classes/seminar/Cousot--A%20Tutorial%20on%20AI.pdf" time_added="1573165870" tags="">A Tutorial on Abstract Interpretation</a></li> | |
<li><a href="https://towardsdatascience.com/how-exactly-umap-works-13e3040e1668" time_added="1573156480" tags="">How Exactly UMAP Works - Towards Data Science</a></li> | |
<li><a href="https://noduslabs.com/cases/tutorial-lda-text-mining-network-analysis/" time_added="1573154460" tags="">Tutorial: Text Mining Using LDA and Network Analysis | Nodus Labs</a></li> | |
<li><a href="https://towardsdatascience.com/beyond-word-embeddings-part-2-word-vectors-nlp-modeling-from-bow-to-bert-4ebd4711d0ec" time_added="1573094497" tags="">Beyond Word Embeddings Part 2 - Towards Data Science</a></li> | |
<li><a href="https://research.swtch.com/gorace" time_added="1573004364" tags="">research!rsc: Off to the Races</a></li> | |
<li><a href="https://bytes.grubhub.com/search-query-embeddings-using-query2vec-f5931df27d79" time_added="1572999547" tags="">Query2vec: Search query expansion with query embeddings</a></li> | |
<li><a href="http://www.jacobsilterra.com/2017/12/11/classifying-and-clustering-with-fasttext/" time_added="1572893154" tags="">Classifying and visualizing with fastText and tSNE | Jacob Silterra</a></li> | |
<li><a href="http://nlpx.net/archives/330" time_added="1572814863" tags="">A tale about LDA2vec: when LDA meets word2vec - NLPx</a></li> | |
<li><a href="https://towardsdatascience.com/text2image-a-new-way-to-nlp-cbf63376aa0d" time_added="1572722586" tags="">Text2Image: A new way to NLP? - Towards Data Science</a></li> | |
<li><a href="http://developer.squareup.com/blog/inferring-label-hierarchies-with-hlda" time_added="1572649532" tags="">Inferring Label Hierarchies with hLDA | Square Corner Blog</a></li> | |
<li><a href="https://multithreaded.stitchfix.com/blog/2016/05/27/lda2vec/" time_added="1572648748" tags="">Introducing our Hybrid lda2vec Algorithm | Stitch Fix Technology – Multithr</a></li> | |
<li><a href="http://mccormickml.com/2016/04/19/word2vec-tutorial-the-skip-gram-model/" time_added="1572645472" tags="">Word2Vec Tutorial - The Skip-Gram Model · Chris McCormick</a></li> | |
<li><a href="https://medium.com/nanonets/topic-modeling-with-lsa-psla-lda-and-lda2vec-555ff65b0b05" time_added="1572570305" tags="">Topic Modeling with LSA, PLSA, LDA & lda2Vec - NanoNets - Medium</a></li> | |
<li><a href="https://markroxor.github.io/gensim/static/notebooks/gensim_news_classification.html" time_added="1572569757" tags="">gensim_news_classification</a></li> | |
<li><a href="https://radimrehurek.com/gensim/models/hdpmodel.html" time_added="1572567674" tags="">gensim: models.hdpmodel – Hierarchical Dirichlet Process</a></li> | |
<li><a href="https://aws.amazon.com/blogs/machine-learning/enhanced-text-classification-and-word-vectors-using-amazon-sagemaker-blazingtext/" time_added="1572567428" tags="">Enhanced text classification and word vectors using Amazon SageMaker Blazin</a></li> | |
<li><a href="https://realpython.com/python-keras-text-classification/" time_added="1572567283" tags="">Practical Text Classification With Python and Keras – Real Python</a></li> | |
<li><a href="https://medium.com/towards-artificial-intelligence/multi-class-text-classification-using-pyspark-mllib-doc2vec-dbfcee5b39f2" time_added="1572567267" tags="">Multi-Class Text Classification Using PySpark, MLlib & Doc2Vec</a></li> | |
<li><a href="https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/" time_added="1572556890" tags="">Creating an LLVM Sanitizer from Hopes and Dreams | Trail of Bits Blog</a></li> | |
<li><a href="https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers" time_added="1572551005" tags="">Abusing HTTP hop-by-hop request headers - My Blog</a></li> | |
<li><a href="https://rare-technologies.com/implementing-poincare-embeddings/" time_added="1572545742" tags="">Implementing Poincaré Embeddings | RARE Technologies</a></li> | |
<li><a href="https://nbviewer.jupyter.org/github/RaRe-Technologies/gensim/blob/develop/docs/notebooks/Poincare%20Tutorial.ipynb" time_added="1572545703" tags="">Jupyter Notebook Viewer</a></li> | |
<li><a href="https://nickcdryan.com/2017/01/23/multi-label-classification-a-guided-tour/" time_added="1572479976" tags="">Multi-label Classification: A Guided Tour – Nick Ryan</a></li> | |
<li><a href="https://fzr72725.github.io/2018/01/14/genism-guide.html" time_added="1572479722" tags="">My Pipeline of Text Classification Using Gensim’s Doc2Vec and Logistic Regr</a></li> | |
<li><a href="https://www.kdnuggets.com/2018/03/hierarchical-classification.html" time_added="1572479045" tags="">Hierarchical Classification – a useful approach for predicting thousands of</a></li> | |
<li><a href="https://www.aclweb.org/anthology/P19-3015.pdf" time_added="1572478431" tags="">NeuralClassifier: An Open-source Neural Hierarchical Multi-label Text Class</a></li> | |
<li><a href="https://davidallenfox.wordpress.com/2017/11/01/hierarchical-multi-label-classification-of-news-content/" time_added="1572478292" tags="">Hierarchical multi-label classification of news content using machine learn</a></li> | |
<li><a href="https://towardsdatascience.com/https-medium-com-noa-weiss-the-hitchhikers-guide-to-hierarchical-classification-f8428ea1e076" time_added="1572477430" tags="">The Hitchhiker’s Guide to Hierarchical Classification</a></li> | |
<li><a href="http://retrobits.net/atari/sam.shtml" time_added="1572465591" tags="">S.A.M. -- The Software Automatic Mouth</a></li> | |
<li><a href="https://medium.com/@donhopkins/the-story-of-sun-microsystems-pizzatool-2a7992b4c797" time_added="1572462513" tags="">The Story of Sun Microsystems PizzaTool - Don Hopkins - Medium</a></li> | |
<li><a href="https://ahmedbesbes.com/how-to-mine-newsfeed-data-and-extract-interactive-insights-in-python.html" time_added="1572406956" tags="">Ahmed BESBES - Data Science Portfolio – How to mine newsfeed data and extra</a></li> | |
<li><a href="https://www.analyticsvidhya.com/blog/2018/02/the-different-methods-deal-text-data-predictive-python/" time_added="1572406699" tags="">Ultimate guide to deal with Text Data (using Python) - for Data Scientists </a></li> | |
<li><a href="https://docs.microsoft.com/en-us/azure/architecture/best-practices/api-design" time_added="1572313471" tags="">API design guidance - Best practices for cloud applications | Microsoft Doc</a></li> | |
<li><a href="https://hackernoon.com/restful-api-designing-guidelines-the-best-practices-60e1d954e7c9" time_added="1572313449" tags="">RESTful API Designing guidelines — The best practices - By</a></li> | |
<li><a href="https://codepen.io/H2xDev/pen/QeMwjo" time_added="1572299160" tags="">Flying through Web</a></li> | |
<li><a href="https://jlorince.github.io/viz-tutorial/" time_added="1572247849" tags="">A simple tutorial for visualization of large, high-dimensional data – Jared</a></li> | |
<li><a href="https://innashteinbuk.com/doc2vec-gizmodo/" time_added="1572247846" tags="">Doc2vec with Gizmodo articles | Inna Shteinbuk</a></li> | |
<li><a href="https://medium.com/@morga046/multi-class-text-classification-with-doc2vec-and-t-sne-a-full-tutorial-55eb24fc40d3" time_added="1572234933" tags="">Multi-Class Text Classification with Doc2Vec and t-SNE, a full tutorial.</a></li> | |
<li><a href="https://towardsdatascience.com/multi-class-text-classification-with-doc2vec-logistic-regression-9da9947b43f4" time_added="1572234903" tags="">Multi-Class Text Classification with Doc2Vec & Logistic Regression</a></li> | |
<li><a href="https://towardsdatascience.com/word2vec-from-scratch-with-numpy-8786ddd49e72" time_added="1572234572" tags="">Word2vec from Scratch with NumPy - Towards Data Science</a></li> | |
<li><a href="https://habr.com/en/company/dsec/blog/472762/" time_added="1571970960" tags="">Technical analysis of the checkm8 exploit / Habr</a></li> | |
<li><a href="https://towardsdatascience.com/facebook-research-just-published-an-awesome-paper-on-learning-hierarchical-representations-34e3d829ede7" time_added="1571886927" tags="">Facebook Research just published an awesome paper on learning hierarchical </a></li> | |
<li><a href="https://aws.amazon.com/blogs/machine-learning/how-to-deploy-deep-learning-models-with-aws-lambda-and-tensorflow/" time_added="1571866055" tags="">https://aws.amazon.com/blogs/machine-learning/how-to-deploy-deep-learning-models-with-aws-lambda-and-tensorflow/</a></li> | |
<li><a href="https://medium.com/scaleabout/a-gentle-introduction-to-doc2vec-db3e8c0cce5e" time_added="1571863571" tags="">A gentle introduction to Doc2Vec - ScaleAbout - Medium</a></li> | |
<li><a href="https://arxiv.org/abs/1405.4053" time_added="1571862990" tags="">[1405.4053] Distributed Representations of Sentences and Documents</a></li> | |
<li><a href="https://blog.xkcd.com/2010/05/03/color-survey-results/" time_added="1571634628" tags="">Color Survey Results – xkcd</a></li> | |
<li><a href="http://www.uco.es/users/ma1fegan/Comunes/asignaturas/vision/Encyclopedia-of-distances-2009.pdf" time_added="1571634555" tags="">Encyclopedia-of-distances-2009.pdf</a></li> | |
<li><a href="https://gist.github.com/aparrish/2f562e3737544cf29aaf1af30362f469" time_added="1571632331" tags="">Understanding word vectors: A tutorial for "Reading and Writing Electronic </a></li> | |
<li><a href="https://hernan.de/blog/2019/10/15/tailoring-cve-2019-2215-to-achieve-root/" time_added="1571240270" tags="">Grant H. - Tailoring CVE-2019-2215 to Achieve Root</a></li> | |
<li><a href="https://blog.francium.tech/content-based-text-classification-with-doc2vec-and-tensorflow-efd1dd4f02a8" time_added="1570943482" tags="">Content Based Text Classification with Doc2Vec and TensorFlow</a></li> | |
<li><a href="http://distill.pub/" time_added="1570855312" tags="">Distill — Latest articles about machine learning</a></li> | |
<li><a href="https://www.youtube.com/playlist?list=PLZHQObOWTQDNU6R1_67000Dx_ZCJB-3pi" time_added="1570855164" tags="">Watch "Neural networks" on YouTube</a></li> | |
<li><a href="http://colah.github.io/posts/2014-07-NLP-RNNs-Representations/" time_added="1570851676" tags="">Deep Learning, NLP, and Representations - colah's blog</a></li> | |
<li><a href="https://medium.com/@r00__/decoding-a-broken-qr-code-39fc3473a034" time_added="1570824385" tags="">Decoding a Broken QR Code - .r00 - Medium</a></li> | |
<li><a href="https://adventuresinmachinelearning.com/neural-networks-tutorial/" time_added="1570512777" tags="">Neural Networks Tutorial - A Pathway to Deep Learning - Adventures in Machi</a></li> | |
<li><a href="https://adventuresinmachinelearning.com/stochastic-gradient-descent/" time_added="1570512766" tags="">Stochastic Gradient Descent - Mini-batch and more - Adventures in Machine L</a></li> | |
<li><a href="https://blog.medium.com/what-are-bloom-filters-1ec2a50c68ff" time_added="1570141102" tags="">What are Bloom filters? - 3 min read</a></li> | |
<li><a href="https://lineageos.org/engineering/Qualcomm-Firmware/" time_added="1569774308" tags="">https://lineageos.org/engineering/Qualcomm-Firmware/</a></li> | |
<li><a href="https://medium.com/@david.richard.holtz/text-analysis-in-2019-finding-similar-badges-9b7486b4c56c" time_added="1569523657" tags="">Text Analysis in 2019 — Finding similar badges - David Richard Holtz - Medi</a></li> | |
<li><a href="https://getpocket.com/explore/item/here-s-why-time-off-work-actually-improves-your-work-and-life" time_added="1569515784" tags="">https://getpocket.com/explore/item/here-s-why-time-off-work-actually-improves-your-work-and-life</a></li> | |
<li><a href="https://www.tensorflow.org/tutorials/representation/word2vec" time_added="1569483407" tags="">https://www.tensorflow.org/tutorials/representation/word2vec</a></li> | |
<li><a href="http://people.seas.harvard.edu/~srush/emnlp2015_slides.pdf" time_added="1569435739" tags="">A Neural Attention Model for Abstractive Sentence Summarization</a></li> | |
<li><a href="https://pytorch.org/tutorials/intermediate/char_rnn_classification_tutorial.html" time_added="1569435731" tags="">NLP From Scratch: Classifying Names with a Character-Level RNN — PyTorch Tu</a></li> | |
<li><a href="https://datascience.stackexchange.com/questions/10077/keyword-phrase-extraction-from-text-using-deep-learning-libraries" time_added="1569435529" tags="">neural network - Keyword/phrase extraction from Text using Deep Learning li</a></li> | |
<li><a href="https://www.nltk.org/book/" time_added="1569435332" tags="">NLTK Book</a></li> | |
<li><a href="https://medium.com/jatana/unsupervised-text-summarization-using-sentence-embeddings-adb15ce83db1" time_added="1569433881" tags="">Unsupervised Text Summarization using Sentence Embeddings</a></li> | |
<li><a href="https://ferrous-systems.com/blog/lock-free-ring-buffer/" time_added="1569200827" tags="">The design and implementation of a lock-free ring-buffer with contiguous re</a></li> | |
<li><a href="https://stackoverflow.blog/2019/09/17/joel-spolsky-clive-thompson-discuss-coders-software-programming/" time_added="1568999329" tags="">https://stackoverflow.blog/2019/09/17/joel-spolsky-clive-thompson-discuss-coders-software-programming/</a></li> | |
<li><a href="https://getpocket.com/explore/item/burnout-runs-deeper-than-too-much-work" time_added="1568999306" tags="">https://getpocket.com/explore/item/burnout-runs-deeper-than-too-much-work</a></li> | |
<li><a href="https://elemental.medium.com/bring-back-handwriting-its-good-for-your-brain-fe22fe6c81d2" time_added="1568824932" tags="">https://elemental.medium.com/bring-back-handwriting-its-good-for-your-brain-fe22fe6c81d2</a></li> | |
<li><a href="https://lwn.net/Articles/798230/" time_added="1568662903" tags="">https://lwn.net/Articles/798230/</a></li> | |
<li><a href="https://blog.quarkslab.com/weisfeiler-lehman-graph-kernel-for-binary-function-analysis.html" time_added="1568056630" tags="">Weisfeiler-Lehman Graph Kernel for Binary Function Analysis</a></li> | |
<li><a href="https://github.com/kamranahmedse/developer-roadmap" time_added="1567663156" tags="">kamranahmedse/developer-roadmap: Roadmap to becoming a web developer in 201</a></li> | |
<li><a href="https://medium.com/@kulor/creating-an-offline-first-react-native-app-5534d7794969" time_added="1567551574" tags="">Creating an offline-first React Native app - James Broad - Medium</a></li> | |
<li><a href="https://technology.riotgames.com/news/random-acts-optimization" time_added="1567192506" tags="">Random Acts of Optimization | Riot Games Technology</a></li> | |
<li><a href="https://blog.regehr.org/archives/1603" time_added="1567192496" tags="">How LLVM Optimizes a Function – Embedded in Academia</a></li> | |
<li><a href="https://getpocket.com/explore/item/the-problem-with-hack-culture" time_added="1567032148" tags="">https://getpocket.com/explore/item/the-problem-with-hack-culture</a></li> | |
<li><a href="https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html?m=1" time_added="1566576989" tags="">https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html?m=1</a></li> | |
<li><a href="https://bke.ro/working-wwan-on-the-x1-carbon-gen-6/" time_added="1566275160" tags="">Working WWAN on the X1 Carbon Gen 6 – Bke.ro</a></li> | |
<li><a href="https://theartofmachinery.com/2019/08/12/c_const_isnt_for_performance.html" time_added="1566253319" tags="">Why const Doesn't Make C Code Faster — The Art of Machinery</a></li> | |
<li><a href="https://awesomekling.github.io/Serenity-C++-patterns-NetworkOrdered/" time_added="1566010825" tags="">Serenity C patterns: NetworkOrdered – Andreas Kling – I like computers!</a></li> | |
<li><a href="https://blog.exodusintel.com/2017/07/26/broadpwn/" time_added="1565284985" tags="">Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-</a></li> | |
<li><a href="https://www.youtube.com/watch?v=-RT5sQZ-ckY" time_added="1564683601" tags="">https://www.youtube.com/watch?v=-RT5sQZ-ckY</a></li> | |
<li><a href="http://www.cs.yale.edu/homes/hudak/Papers/HSoM.pdf" time_added="1564429657" tags="haskell,music">19_3.eps</a></li> | |
<li><a href="https://blog.stalkr.net/2015/04/golang-data-races-to-break-memory-safety.html?m=1" time_added="1564257357" tags="">https://blog.stalkr.net/2015/04/golang-data-races-to-break-memory-safety.html?m=1</a></li> | |
<li><a href="https://m-cacm.acm.org/magazines/2019/8/238344-scaling-static-analyses-at-facebook/fulltext" time_added="1564073086" tags="">https://m-cacm.acm.org/magazines/2019/8/238344-scaling-static-analyses-at-facebook/fulltext</a></li> | |
<li><a href="http://matt.might.net/papers/vanhorn2010abstract.pdf" time_added="1564072658" tags="">http://matt.might.net/papers/vanhorn2010abstract.pdf</a></li> | |
<li><a href="https://docs.imandra.ai/imandra-docs/notebooks/reasonml-facetime-state-machines/" time_added="1564030186" tags="">Imandra Documentation - Exploring The Apple FaceTime Bug with ReasonML Stat</a></li> | |
<li><a href="https://dave.cheney.net/2019/07" time_added="1563998934" tags="">July | 2019 | Dave Cheney</a></li> | |
<li><a href="https://www.emfscientist.org/index.php/emf-scientist-appeal" time_added="1563916153" tags="">EMFscientist.org - International EMF Scientist Appeal</a></li> | |
<li><a href="https://simson.net/ref/1993/cubefire.html" time_added="1563406990" tags="">Date: Wed, 24 Mar 93 19:11:02 EST</a></li> | |
<li><a href="https://blog.trailofbits.com/2019/07/08/fuck-rsa/" time_added="1562611534" tags="">https://blog.trailofbits.com/2019/07/08/fuck-rsa/</a></li> | |
<li><a href="https://cubicoder.github.io/tutorials/1-12-2/2018-06-19-setting-up-the-development-environment/" time_added="1561837068" tags="">https://cubicoder.github.io/tutorials/1-12-2/2018-06-19-setting-up-the-development-environment/</a></li> | |
<li><a href="https://blog.ret2.io/2019/06/26/attacking-intel-tsx/" time_added="1561758090" tags="">https://blog.ret2.io/2019/06/26/attacking-intel-tsx/</a></li> | |
<li><a href="https://haifengl.wordpress.com/2014/07/15/ocaml-modules/" time_added="1561402247" tags="">https://haifengl.wordpress.com/2014/07/15/ocaml-modules/</a></li> | |
<li><a href="https://link.springer.com/article/10.1007/s11199-007-9188-2" time_added="1561385486" tags="">https://link.springer.com/article/10.1007/s11199-007-9188-2</a></li> | |
<li><a href="https://theofficialflow.github.io/2019/06/18/trinity.html" time_added="1560966932" tags="">https://theofficialflow.github.io/2019/06/18/trinity.html</a></li> | |
<li><a href="https://www.gq.com/story/too-much-sleep?utm_source=pocket-newtab" time_added="1560655287" tags="">https://www.gq.com/story/too-much-sleep?utm_source=pocket-newtab</a></li> | |
<li><a href="https://poverty.ucdavis.edu/faq/what-current-poverty-rate-united-states" time_added="1560461687" tags="">https://poverty.ucdavis.edu/faq/what-current-poverty-rate-united-states</a></li> | |
<li><a href="https://openwall.info/wiki/_media/people/jvanegue/files/spw15_heap_models_vanegue_latest.pdf" time_added="1560458104" tags="">https://openwall.info/wiki/_media/people/jvanegue/files/spw15_heap_models_vanegue_latest.pdf</a></li> | |
<li><a href="https://www.history.com/news/black-panthers-gun-control-nra-support-mulford-act" time_added="1560158011" tags="guns">The NRA Supported Gun Control When the Black Panthers Had the Weapons - HIS</a></li> | |
<li><a href="https://medium.com/analytics-vidhya/automated-keyword-extraction-from-articles-using-nlp-bfd864f41b34" time_added="1559863887" tags="">Automated Keyword Extraction from Articles using NLP</a></li> | |
<li><a href="https://www.airpair.com/nlp/keyword-extraction-tutorial" time_added="1559863867" tags="">NLP keyword extraction tutorial with RAKE and Maui</a></li> | |
<li><a href="https://raw.githubusercontent.com/microsoft/language-server-protocol/master/indexFormat/specification.md" time_added="1559676914" tags="">https://raw.githubusercontent.com/microsoft/language-server-protocol/master</a></li> | |
<li><a href="https://lobste.rs/" time_added="1559664681" tags="">https://lobste.rs/</a></li> | |
<li><a href="https://cr.yp.to/djb.html" time_added="1559664592" tags="">https://cr.yp.to/djb.html</a></li> | |
<li><a href="https://www.youtube.com/watch?v=kskrazLDq1A" time_added="1559265199" tags="bass,licks,tutorial">(208) Modulating Sweep Arpeggios & Inversions - YouTube</a></li> | |
<li><a href="https://9p.io/sys/doc/auth.html" time_added="1559009236" tags="">https://9p.io/sys/doc/auth.html</a></li> | |
<li><a href="https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_rui" time_added="1558733340" tags="coding">Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication a</a></li> | |
<li><a href="https://gettys.wordpress.com/2018/02/11/the-blind-men-and-the-elephant/" time_added="1558402414" tags="networking">The Blind Men and the Elephant | jg's Ramblings</a></li> | |
<li><a href="https://briantimar.github.io/notes/mimetic/mimetic" time_added="1558394695" tags="psychology,selfhelp">mimetic</a></li> | |
<li><a href="https://linxz.co.uk/cryptography ground up/2019/01/25/CGU-Introduction.html" time_added="1558215317" tags="">https://linxz.co.uk/cryptography ground up/2019/01/25/CGU-Introduction.html</a></li> | |
<li><a href="http://fabiensanglard.net/gebbdoom_v1.1.pdf" time_added="1558214971" tags="">http://fabiensanglard.net/gebbdoom_v1.1.pdf</a></li> | |
<li><a href="https://alasdairmclachlanmusic.files.wordpress.com/2015/05/reapers.pdf" time_added="1558134294" tags="bass,tabs">Reapers</a></li> | |
<li><a href="https://www.frc.org/brochure/the-best-pro-life-arguments-for-secular-audiences" time_added="1558118336" tags="abortion">The Best Pro-Life Arguments for Secular Audiences</a></li> | |
<li><a href="https://static1.squarespace.com/static/51fab339e4b0dfbd79177ae2/t/5a1713bfec212d9bd3899787/1511461823827/Dean+Town+-+Vulfpeck+-+Joe+Dart+-+Bass+Transcription+-+Full+Score.pdf" time_added="1557936432" tags="bass,sheetmusic,vulfpeck">Dean Town - Vulfpeck - Joe Dart - Bass Transcription - Full Score.pdf</a></li> | |
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf" time_added="1557760923" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf</a></li> | |
<li><a href="https://www.riverloopsecurity.com/blog/2019/05/pcode/" time_added="1557714695" tags="">https://www.riverloopsecurity.com/blog/2019/05/pcode/</a></li> | |
<li><a href="https://shafik.github.io/c++/undefined behavior/2019/05/11/explporing_undefined_behavior_using_constexpr.html" time_added="1557714601" tags="">https://shafik.github.io/c++/undefined behavior/2019/05/11/explporing_undefined_behavior_using_constexpr.html</a></li> | |
<li><a href="https://www.newyorker.com/books/under-review/eric-hobsbawm-the-communist-who-explained-history?utm_source=pocket-newtab" time_added="1557694965" tags="">https://www.newyorker.com/books/under-review/eric-hobsbawm-the-communist-who-explained-history?utm_source=pocket-newtab</a></li> | |
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf" time_added="1557680669" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf</a></li> | |
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li & Lilang Wu.pdf" time_added="1557544407" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li & Lilang Wu.pdf</a></li> | |
<li><a href="https://doar-e.github.io/blog/2019/05/09/circumventing-chromes-hardening-of-typer-bugs/" time_added="1557422692" tags="">https://doar-e.github.io/blog/2019/05/09/circumventing-chromes-hardening-of-typer-bugs/</a></li> | |
<li><a href="http://getpocket.com/explore/item/why-can-t-the-world-s-greatest-minds-solve-the-mystery-of-consciousness" time_added="1557422429" tags="">http://getpocket.com/explore/item/why-can-t-the-world-s-greatest-minds-solve-the-mystery-of-consciousness</a></li> | |
<li><a href="https://pdfs.semanticscholar.org/5a58/00deb6461b3d022c8465e5286908de9f8d4e.pdf" time_added="1557344627" tags="keyword extraction">c01.dvi</a></li> | |
<li><a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf" time_added="1557274238" tags="exploit,virtualbox">https://www.blackhat.com/docs/eu-17/materials/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf</a></li> | |
<li><a href="https://jsthomas.github.io/map-comparison.html" time_added="1557210259" tags="benchmark,ocaml">Joe Thomas | Microbenchmarking Implementations of Map in OCaml</a></li> | |
<li><a href="https://www.tezos.org.sg/is-ocaml-really-easier-to-formally-verify/" time_added="1557210176" tags="formal-verification,ocaml">OCaml is easier to formally verify | Tezos Southeast Asia</a></li> | |
<li><a href="https://sparkes.zone/blog/ios/2019/04/30/machswap-ios-12-kernel-exploit.html" time_added="1556677724" tags="">https://sparkes.zone/blog/ios/2019/04/30/machswap-ios-12-kernel-exploit.html</a></li> | |
<li><a href="https://raygun.com/blog/golang-auto-scaling/" time_added="1556078720" tags="">https://raygun.com/blog/golang-auto-scaling/</a></li> | |
<li><a href="https://mgba.io/2017/07/31/holy-grail-bugs-2/" time_added="1556053764" tags="gameboy">"Holy Grail" Bugs in Emulation, Part 2 - mGBA</a></li> | |
<li><a href="https://mgba.io/2017/05/29/holy-grail-bugs/#pinball-fantasies" time_added="1556053755" tags="gameboy">"Holy Grail" Bugs in Emulation, Part 1 - mGBA</a></li> | |
<li><a href="https://accidentallyquadratic.tumblr.com/" time_added="1555985668" tags="">https://accidentallyquadratic.tumblr.com/</a></li> | |
<li><a href="https://stek29.rocks/2017/08/07/frida-stdstring.html" time_added="1554770966" tags="frida,reverse">Frida and std::string | stek29.rocks</a></li> | |
<li><a href="http://www.oldlinux.org/download/ECLK-5.0-WithCover.pdf" time_added="1554600086" tags="linux">ECLK-5.0-WithCover.pdf</a></li> | |
<li><a href="https://pleasestopnamingvulnerabilities.com/" time_added="1554593048" tags="android,rce,wifi">Please Stop Naming Vulnerabilities: Exploring 6 Previously Unknown Remote K</a></li> | |
<li><a href="http://www.bottomupcs.com/" time_added="1554327449" tags="computers">Computer Science from the Bottom Up</a></li> | |
<li><a href="https://latacora.micro.blog/2018/04/03/cryptographic-right-answers.html" time_added="1552674189" tags="">Cryptographic Right Answers</a></li> | |
<li><a href="https://www.multivax.com/last_question.html" time_added="1552602739" tags="">The Last Question -- Isaac Asimov</a></li> | |
<li><a href="https://blog.stephenwolfram.com/2019/02/seeking-the-productive-life-some-details-of-my-personal-infrastructure/" time_added="1550800883" tags="">https://blog.stephenwolfram.com/2019/02/seeking-the-productive-life-some-details-of-my-personal-infrastructure/</a></li> | |
<li><a href="https://sarabander.github.io/sicp/html/index.xhtml" time_added="1548965423" tags="">Structure and Interpretation of Computer Programs, 2e: Top</a></li> | |
<li><a href="http://janmidtgaard.dk/aiws15/" time_added="1548293606" tags="">Abstract Interpretation Winter School</a></li> | |
<li><a href="http://web.mit.edu/16.399/www/#lecture-18" time_added="1548293400" tags="">MIT Course 16.399: « Abstract Interpretation » Home Page</a></li> | |
<li><a href="https://blog.exodusintel.com/2019/01/22/exploiting-the-magellan-bug-on-64-bit-chrome-desktop/" time_added="1548270438" tags="">https://blog.exodusintel.com/2019/01/22/exploiting-the-magellan-bug-on-64-bit-chrome-desktop/</a></li> | |
<li><a href="http://newosxbook.com/articles/DYLD.html" time_added="1548117249" tags="">DYLD DetaYLeD</a></li> | |
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2012-11-09-dyld-dynamic-linking-on-os-x.html" time_added="1547538263" tags="">mikeash.com: Friday Q&A 2012-11-09: dyld: Dynamic Linking On OS X</a></li> | |
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2017-06-30-dissecting-objc_msgsend-on-arm64.html" time_added="1547012353" tags="">mikeash.com: Friday Q&A 2017-06-30: Dissecting objc_msgSend on ARM64</a></li> | |
<li><a href="http://m.nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it" time_added="1546714127" tags="">http://m.nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it</a></li> | |
<li><a href="https://getpocket.com/explore/item/love-after-life-nobel-winning-physicist-richard-feynman-s-extraordinary-letter-to-his-departed-wife" time_added="1546712423" tags="">https://getpocket.com/explore/item/love-after-life-nobel-winning-physicist-richard-feynman-s-extraordinary-letter-to-his-departed-wife</a></li> | |
<li><a href="https://hardflag.q3k.org/" time_added="1545326529" tags="">hardflag</a></li> | |
<li><a href="https://lightbulbone.com/posts/2015/12/bluetool/" time_added="1544919482" tags="">LightBulbOne</a></li> | |
<li><a href="https://blog.zimperium.com/cve-2018-9411-new-critical-vulnerability-multiple-high-privileged-android-services/" time_added="1544821262" tags="">CVE-2018-9411: New critical vulnerability in multiple high-privileged Andro</a></li> | |
<li><a href="https://www.windytan.com/2017/11/in-pursuit-of-otamas-tone.html" time_added="1544814084" tags="sdr">absorptions: In pursuit of Otama's tone</a></li> | |
<li><a href="http://blog.cyberexplorer.me/2014/01/sniffing-and-decoding-nrf24l01-and.html" time_added="1544814022" tags="sdr">Cyber Explorer: Sniffing and decoding NRF24L01 and Bluetooth LE packets fo</a></li> | |
<li><a href="https://justinmeiners.github.io/lc3-vm/" time_added="1544806188" tags="">https://justinmeiners.github.io/lc3-vm/</a></li> | |
<li><a href="https://www.samba.org/ftp/tridge/misc/french_cafe.txt" time_added="1544211442" tags="">https://www.samba.org/ftp/tridge/misc/french_cafe.txt</a></li> | |
<li><a href="https://esoteric.codes/blog/evan-buswell" time_added="1544030660" tags="">Evan Buswell - esoteric.codes</a></li> | |
<li><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/ms17-010-eternalblue/" time_added="1543542896" tags="">MS17-010: EternalBlue’s Large Non-Paged Pool Overflow in SRV Driver - Trend</a></li> | |
<li><a href="https://www.synacktiv.com/ressources/zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf" time_added="1543280687" tags="">Turning your BMC into a revolving door</a></li> | |
<li><a href="https://l.avala.mp/?p=285" time_added="1543271325" tags="">IPv666 – Address of the Beast – l.avala.mp's place</a></li> | |
<li><a href="https://www.cs.cornell.edu/~asampson/blog/llvm.html" time_added="1543026186" tags="">https://www.cs.cornell.edu/~asampson/blog/llvm.html</a></li> | |
<li><a href="http://newandroidbook.com/AIvI-M-RL1.pdf" time_added="1542826607" tags="">AIvI-M-RL1.pdf</a></li> | |
<li><a href="https://blogs.msdn.microsoft.com/oldnewthing/20181120-00/?p=100275" time_added="1542816216" tags="">https://blogs.msdn.microsoft.com/oldnewthing/20181120-00/?p=100275</a></li> | |
<li><a href="http://www.naturalborncoder.com/virtualization/2014/10/17/understanding-tun-tap-interfaces/" time_added="1542789259" tags="">Understanding TUN TAP Interfaces - Natural Born Coder</a></li> | |
<li><a href="http://geraldschroeder.com/wordpress/?page_id=4" time_added="1542700276" tags="">God According to God | Gerald Schroeder</a></li> | |
<li><a href="https://gamozolabs.github.io/fuzzing/2018/11/19/vectorized_emulation_mmu.html" time_added="1542660746" tags="">Vectorized Emulation: MMU Design | Gamozo Labs Blog</a></li> | |
<li><a href="https://www.iep.utm.edu/durkheim/" time_added="1542409538" tags="">Durkheim, Emile | Internet Encyclopedia of Philosophy</a></li> | |
<li><a href="https://www.newyorker.com/magazine/2016/01/25/dead-certainty" time_added="1542049681" tags="">https://www.newyorker.com/magazine/2016/01/25/dead-certainty</a></li> | |
<li><a href="https://www.newyorker.com/magazine/2016/10/10/karl-marx-yesterday-and-today" time_added="1541119709" tags="">Karl Marx, Yesterday and Today | The New Yorker</a></li> | |
<li><a href="http://slatestarcodex.com/2014/09/13/book-review-singer-on-marx/" time_added="1541119696" tags="">Book Review: Singer on Marx | Slate Star Codex</a></li> | |
<li><a href="http://zguide.zeromq.org/page:all" time_added="1540699129" tags="">ØMQ - The Guide - ØMQ - The Guide</a></li> | |
<li><a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" time_added="1540621305" tags="">The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies - Blo</a></li> | |
<li><a href="https://www.reddit.com/r/philosophy/comments/9njr1t/the_trolley_problem_a_website_that_gives_a/?st=JN6U4WLO&sh=00536754" time_added="1539398530" tags="">https://www.reddit.com/r/philosophy/comments/9njr1t/the_trolley_problem_a_website_that_gives_a/?st=JN6U4WLO&sh=00536754</a></li> | |
<li><a href="https://www.reddit.com/r/netsec/comments/9kq7le/cve201711176_a_stepbystep_linux_kernel/?st=JMRUMK8J&sh=6823add2" time_added="1538492364" tags="">https://www.reddit.com/r/netsec/comments/9kq7le/cve201711176_a_stepbystep_linux_kernel/?st=JMRUMK8J&sh=6823add2</a></li> | |
<li><a href="https://www.reddit.com/r/cpp/comments/9k9ryb/how_compilers_take_advantage_of_undefined/?st=JMPH1QHT&sh=5547c0d3" time_added="1538348621" tags="">https://www.reddit.com/r/cpp/comments/9k9ryb/how_compilers_take_advantage_of_undefined/?st=JMPH1QHT&sh=5547c0d3</a></li> | |
<li><a href="https://www.synacktiv.com/posts/hardware/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html" time_added="1537284159" tags="">Hunting mobile devices endpoints - the RF and the Hard way</a></li> | |
<li><a href="http://shell-storm.org/blog/Taint-analysis-and-pattern-matching-with-Pin/" time_added="1536615572" tags="pin,taint">shell-storm | Taint analysis and pattern matching with Pin</a></li> | |
<li><a href="http://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/" time_added="1536605803" tags="exploit,webkit">Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog</a></li> | |
<li><a href="https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/" time_added="1536605758" tags="">CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.</a></li> | |
<li><a href="https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware" time_added="1536598104" tags="">https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware</a></li> | |
<li><a href="https://static1.squarespace.com/static/51fab339e4b0dfbd79177ae2/t/5a15ee65652dea2e1ac977d8/1511386730713/JoeDart.Vulfpeck.BirdsOfAFeather.BassTranscription+-+Full+Score.pdf" time_added="1535568339" tags="bass,vulfpeck">JoeDart.Vulfpeck.BirdsOfAFeather.BassTranscription - Full Score.pdf</a></li> | |
<li><a href="http://4ldebaran.blogspot.com/2018/07/covering-ian-beers-exploit-techniques.html" time_added="1534788150" tags="">http://4ldebaran.blogspot.com/2018/07/covering-ian-beers-exploit-techniques.html</a></li> | |
<li><a href="http://siguza.github.io/KTRR/" time_added="1534788124" tags="">http://siguza.github.io/KTRR/</a></li> | |
<li><a href="http://science.raphael.poss.name/go-calling-convention-x86-64.html" time_added="1533436909" tags="">http://science.raphael.poss.name/go-calling-convention-x86-64.html</a></li> | |
<li><a href="https://geekhack.org/index.php?topic=87689.0" time_added="1533070649" tags="">A modern handwiring guide - stronger, cleaner, easier</a></li> | |
<li><a href="https://www.thingiverse.com/thing:1433117/comments" time_added="1530128497" tags="">Ergodox EZ tent kit by rothgar - Thingiverse</a></li> | |
<li><a href="https://www.reddit.com/r/philosophy/comments/8u9bav/personal_adhominem_attacks_are_unfortunately/?st=JIX9XP7T&sh=90e901e5" time_added="1530113275" tags="">https://www.reddit.com/r/philosophy/comments/8u9bav/personal_adhominem_attacks_are_unfortunately/?st=JIX9XP7T&sh=90e901e5</a></li> | |
<li><a href="https://www.reddit.com/r/netsec/comments/8s9ze7/deserialization_vulnerabilities_attacking/?st=JIM7QL9O&sh=662c3882" time_added="1529444455" tags="">https://www.reddit.com/r/netsec/comments/8s9ze7/deserialization_vulnerabilities_attacking/?st=JIM7QL9O&sh=662c3882</a></li> | |
<li><a href="https://www.reddit.com/r/netsec/comments/8rp0i4/webusb_vulnerabilities_actions_of_yubico_and/?st=JIM7Q0W1&sh=399dca74" time_added="1529444430" tags="">https://www.reddit.com/r/netsec/comments/8rp0i4/webusb_vulnerabilities_actions_of_yubico_and/?st=JIM7Q0W1&sh=399dca74</a></li> | |
<li><a href="http://www.hpmor.com/" time_added="1528321191" tags="">Harry Potter and the Methods of Rationality | Petunia married a professor, </a></li> | |
<li><a href="https://courk.cc/index.php/2018/06/01/a-remote-vulnerability/" time_added="1528095190" tags="">A “Remote” Vulnerability – Courk's Blog</a></li> | |
<li><a href="https://imgur.com/a/mwTFj" time_added="1527796255" tags="">Wireless Split QMK = Mitosis - Album on Imgur</a></li> | |
<li><a href="http://podlipensky.com/2013/11/escape-unescaped/" time_added="1527705013" tags="">Escape unescaped - Pavel Podlipensky</a></li> | |
<li><a href="http://adereth.github.io/blog/2014/02/12/building-an-ergodox/" time_added="1527103639" tags="keyboards,mechanical">Sourcing and Building an ErgoDox Keyboard - adereth</a></li> | |
<li><a href="https://pointersgonewild.com/" time_added="1525821414" tags="">Pointers Gone Wild | A blog about compilers, programming and technology.</a></li> | |
<li><a href="https://www.edge.org/conversation/sabine_hossenfelder-looking-in-the-wrong-places?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1525212617" tags="">https://www.edge.org/conversation/sabine_hossenfelder-looking-in-the-wrong-places?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="https://getpocket.com/s/8Mr6i?cta=1&src=ph" time_added="1525212578" tags="">https://getpocket.com/s/8Mr6i?cta=1&src=ph</a></li> | |
<li><a href="https://github.com/zhengmin1989/GreatiOSJailbreakMaterial" time_added="1524177320" tags="jailbreak">zhengmin1989/GreatiOSJailbreakMaterial: Great iOS Jailbreak Material! - I r</a></li> | |
<li><a href="https://www.theverge.com/2016/4/13/11387934/internet-moderator-history-youtube-facebook-reddit-censorship-free-speech" time_added="1523483649" tags="">The secret rules of the internet</a></li> | |
<li><a href="https://www.1843magazine.com/features/why-do-we-work-so-hard" time_added="1523483580" tags="">Why do we work so hard? | 1843</a></li> | |
<li><a href="https://www.theatlantic.com/science/archive/2018/04/why-whales-got-so-big/557213/" time_added="1523141408" tags="">https://www.theatlantic.com/science/archive/2018/04/why-whales-got-so-big/557213/</a></li> | |
<li><a href="http://m.nautil.us/blog/the-self-is-other-people" time_added="1523141353" tags="">http://m.nautil.us/blog/the-self-is-other-people</a></li> | |
<li><a href="http://www.ii.uni.wroc.pl/~lukstafi/pmwiki/index.php?n=Functional.Functional" time_added="1521768668" tags="ocaml">Lukasz Stafiniak pages | Functional / Functional | browse</a></li> | |
<li><a href="https://www.youtube.com/watch?v=SvmluRCGv_s" time_added="1520897214" tags="">(51) Get Smart - I'm So Happy!!!!! - YouTube</a></li> | |
<li><a href="https://bazad.github.io/2017/09/live-kernel-introspection-ios/bazad.github.io/2017/09/live-kernel-introspection-ios/" time_added="1516646525" tags="">https://bazad.github.io/2017/09/live-kernel-introspection-ios/bazad.github.io/2017/09/live-kernel-introspection-ios/</a></li> | |
<li><a href="https://siguza.github.io/IOHIDeous/" time_added="1514910461" tags="">https://siguza.github.io/IOHIDeous/</a></li> | |
<li><a href="https://www.reddit.com/r/programming/comments/7m8770/til_theres_a_community_called_dwitter_where/?st=JBOKHFF7&sh=95d61ccc" time_added="1514349319" tags="">https://www.reddit.com/r/programming/comments/7m8770/til_theres_a_community_called_dwitter_where/?st=JBOKHFF7&sh=95d61ccc</a></li> | |
<li><a href="http://uaf.io/exploitation/misc/2016/09/10/Kernel-Exploitation-for-Dummies.html" time_added="1513993857" tags="kernel">http://uaf.io/exploitation/misc/2016/09/10/Kernel-Exploitation-for-Dummies.html</a></li> | |
<li><a href="https://siguza.github.io/v0rtex/" time_added="1512721297" tags="">https://siguza.github.io/v0rtex/</a></li> | |
<li><a href="http://www.powerofcommunity.net/poc2016/keen.pdf" time_added="1512422981" tags="">http://www.powerofcommunity.net/poc2016/keen.pdf</a></li> | |
<li><a href="https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/" time_added="1511703279" tags="">https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/</a></li> | |
<li><a href="http://tinyhack.com/2014/07/07/exploiting-the-futex-bug-and-uncovering-towelroot/" time_added="1510608905" tags="android,exploit,kernel">Exploiting the Futex Bug and uncovering Towelroot – Tinyhack.com</a></li> | |
<li><a href="https://acmccs.github.io/papers/p2313-xuA.pdf" time_added="1510091199" tags="">p2313-xuA.pdf</a></li> | |
<li><a href="https://github.com/nongiach/CVE/tree/master/CVE-2017-5123" time_added="1509960664" tags="">CVE/CVE-2017-5123 at master · nongiach/CVE</a></li> | |
<li><a href="http://blog.ice9.us/" time_added="1508969724" tags="bluetooth">ICE9 Blog</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf" time_added="1508959478" tags="">https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-E</a></li> | |
<li><a href="https://feross.org/gcc-ownage/" time_added="1508087955" tags="">https://feross.org/gcc-ownage/</a></li> | |
<li><a href="https://googleprojectzero.blogspot.co.uk/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" time_added="1507755039" tags="android">Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)</a></li> | |
<li><a href="https://copperhead.co/blog/2015/07/27/hardening-bionic" time_added="1507752236" tags="android">Hardening Android's Bionic libc | Blog | Copperhead Security</a></li> | |
<li><a href="https://static1.squarespace.com/static/543effd8e4b095fba39dfe59/t/584f572a2994ca1083f4aba3/1481594669596/BluetoothAttacksonHighSecurityElectronicLocksWhitepaper.pdf" time_added="1507747605" tags="">https://static1.squarespace.com/static/543effd8e4b095fba39dfe59/t/584f572a2994ca1083f4aba3/1481594669596/BluetoothAttacksonHighSecurityElectronicLocksWhitepaper.pdf</a></li> | |
<li><a href="http://gattack.io/whitepaper.pdf" time_added="1507747491" tags="">http://gattack.io/whitepaper.pdf</a></li> | |
<li><a href="https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf" time_added="1507331602" tags="">mwri</a></li> | |
<li><a href="https://mollyrocket.com/casey/stream_0029.html" time_added="1507256961" tags="windows">The Worst API Ever Made</a></li> | |
<li><a href="http://gsec.hitb.org/materials/sg2017/D2%20-%20Adam%20Donenfeld%20-%20Ro(o)tten%20Apples%20-%20Vulnerability%20Heaven%20in%20the%20iOS%20Sandbox.pdf" time_added="1507249832" tags="">PowerPoint Presentation</a></li> | |
<li><a href="https://people.csail.mit.edu/albert/bluez-intro/c54.html" time_added="1507242153" tags="bluetooth">Bluetooth Programming Introduced</a></li> | |
<li><a href="http://people.csail.mit.edu/rudolph/Teaching/Articles/BTBook.pdf" time_added="1507242140" tags="bluetooh,bluetooth">BTBook.pdf</a></li> | |
<li><a href="https://chromium.googlesource.com/chromium/src/+/master/device/bluetooth/" time_added="1507242134" tags="">device/bluetooth - chromium/src - Git at Google</a></li> | |
<li><a href="https://addyosmani.com/resources/essentialjsdesignpatterns/book/" time_added="1507240584" tags="">Learning JavaScript Design Patterns</a></li> | |
<li><a href="http://tinylab.org/linux-lab/" time_added="1507165460" tags="">Technology - Linux kernel experimental environment</a></li> | |
<li><a href="https://arstechnica.com/gadgets/2017/09/macos-10-13-high-sierra-the-ars-technica-review/7/" time_added="1507067360" tags="mac">macOS 10.13 High Sierra: The Ars Technica review | Ars Technica</a></li> | |
<li><a href="http://turingh.github.io/2016/07/05/%E5%86%8D%E7%9C%8BCVE-2016-1757%E6%B5%85%E6%9E%90mach%20message%E7%9A%84%E4%BD%BF%E7%94%A8/" time_added="1507064192" tags="">再看CVE-2016-1757---浅析mach message的使用 | mrh的学习分享</a></li> | |
<li><a href="https://www.reddit.com/r/books/comments/73y5qc/unputdownable_17_books_i_read_in_24_hours_or_less/?st=J8BYLWPQ&sh=8cc1f239" time_added="1507056636" tags="">https://www.reddit.com/r/books/comments/73y5qc/unputdownable_17_books_i_read_in_24_hours_or_less/?st=J8BYLWPQ&sh=8cc1f239</a></li> | |
<li><a href="https://www.reddit.com/r/ReverseEngineering/comments/715whq/gas_pump_skimmers/?st=J7T8FDEM&sh=c99b2286" time_added="1505924269" tags="">https://www.reddit.com/r/ReverseEngineering/comments/715whq/gas_pump_skimmers/?st=J7T8FDEM&sh=c99b2286</a></li> | |
<li><a href="https://www.reddit.com/r/ReverseEngineering/comments/6yea64/flash_dumping_part_1/?st=J7A0Y687&sh=7e8ae077" time_added="1504762852" tags="">https://www.reddit.com/r/ReverseEngineering/comments/6yea64/flash_dumping_part_1/?st=J7A0Y687&sh=7e8ae077</a></li> | |
<li><a href="https://objective-see.com/blog/blog_0x21.html" time_added="1504669639" tags="">https://objective-see.com/blog/blog_0x21.html</a></li> | |
<li><a href="https://www.reddit.com/r/golang/comments/6ugzo2/domain_driven_design_and_go/?st=J6I1OQ6P&sh=8103c36a" time_added="1503071038" tags="">https://www.reddit.com/r/golang/comments/6ugzo2/domain_driven_design_and_go/?st=J6I1OQ6P&sh=8103c36a</a></li> | |
<li><a href="https://heideri.ch/thesis" time_added="1502311952" tags="">thesis</a></li> | |
<li><a href="https://databases.today/" time_added="1500323368" tags="">Public Database Directory - Public DB Host</a></li> | |
<li><a href="https://phoenhex.re/2017-07-06/pwn2own-sandbox-escape" time_added="1499443888" tags="">https://phoenhex.re/2017-07-06/pwn2own-sandbox-escape</a></li> | |
<li><a href="http://ddeville.me/2014/04/dynamic-linking" time_added="1498859829" tags="">Damien DeVille | Dynamic linking on iOS</a></li> | |
<li><a href="http://www.stafforini.com/txt/Covey%20-%20The%207%20habits%20of%20highly%20effective%20people.pdf" time_added="1498247805" tags="">Covey - The 7 habits of highly effective people.pdf</a></li> | |
<li><a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" time_added="1497911747" tags="">https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></li> | |
<li><a href="https://www.elttam.com.au/blog/intro-sdr-and-rf-analysis/" time_added="1497880623" tags="">https://www.elttam.com.au/blog/intro-sdr-and-rf-analysis/</a></li> | |
<li><a href="http://highaltitudehacks.com/2015/01/24/ios-application-security-part-38-attacking-apps-using-parse-guest-lecture-by-egor-tolstoy/" time_added="1497846544" tags="">iOS Application Security Part 38 - Attacking apps using Parse (Guest Lectur</a></li> | |
<li><a href="https://www.theverge.com/2017/6/13/15782200/one-device-secret-history-iphone-brian-merchant-book-excerpt" time_added="1497808869" tags="">The secret origin story of the iPhone - The Verge</a></li> | |
<li><a href="https://dennisforbes.ca/index.php/2016/12/23/androids-secure-enclave-private-content-and-strong-encryption/" time_added="1497808354" tags="secure enclave">Android’s “Secure Enclave” / Private Content and Strong Encryption – Dennis</a></li> | |
<li><a href="https://www.exploitee.rs/" time_added="1497725861" tags="">Exploitee.rs</a></li> | |
<li><a href="https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html" time_added="1497625694" tags="">https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html</a></li> | |
<li><a href="https://buer.haus/" time_added="1496269149" tags="">https://buer.haus/</a></li> | |
<li><a href="https://markmanson.net/life-cheat-codes" time_added="1495654761" tags="">https://markmanson.net/life-cheat-codes</a></li> | |
<li><a href="https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?" time_added="1495213358" tags="">iOS Testing</a></li> | |
<li><a href="https://pocket.co/sMCyh6?cta=1" time_added="1494705224" tags="">https://pocket.co/sMCyh6?cta=1</a></li> | |
<li><a href="http://moodycamel.com/blog/2013/a-fast-lock-free-queue-for-c++" time_added="1494111935" tags="">http://moodycamel.com/blog/2013/a-fast-lock-free-queue-for-c++</a></li> | |
<li><a href="http://www.hackerfactor.com/blog/index.php?/archives/762-Attacked-Over-Tor.html" time_added="1494106316" tags="">Attacked Over Tor - The Hacker Factor Blog</a></li> | |
<li><a href="https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf" time_added="1494035553" tags="">https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf</a></li> | |
<li><a href="https://pst.moe/paste/xciuzd" time_added="1493127822" tags="">xciuzd · pst.moe</a></li> | |
<li><a href="https://googleprojectzero.blogspot.fr/2017/04/exception-oriented-exploitation-on-ios.html" time_added="1492663026" tags="">Project Zero: Exception-oriented exploitation on iOS</a></li> | |
<li><a href="http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf" time_added="1492137402" tags="">http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf</a></li> | |
<li><a href="http://gnu.gds.tuwien.ac.at/software/hurd/gnumach-doc/mach_4.html" time_added="1491962467" tags="mach">The GNU Mach Reference Manual: Inter Process Communication</a></li> | |
<li><a href="https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md" time_added="1491850485" tags="">https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md</a></li> | |
<li><a href="https://rednaga.io/2017/04/09/remote_kext_debugging/" time_added="1491840718" tags="">https://rednaga.io/2017/04/09/remote_kext_debugging/</a></li> | |
<li><a href="https://www.raywenderlich.com/143828/macos-nstableview-tutorial" time_added="1491599044" tags="">macOS NSTableView Tutorial</a></li> | |
<li><a href="https://backchannel.com/love-in-the-time-of-cryptography-dd3a74193ffb" time_added="1491456653" tags="">Love in the Time of Cryptography – Backchannel</a></li> | |
<li><a href="http://yulingtianxia.com/blog/2016/06/15/Objective-C-Message-Sending-and-Forwarding/?locationNum=13&fps=1" time_added="1491424284" tags="objc">Objective-C message sending and forwarding mechanism principle | yulingtian</a></li> | |
<li><a href="https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" time_added="1491336289" tags="exploit">Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)</a></li> | |
<li><a href="https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html" time_added="1491130445" tags="">https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html</a></li> | |
<li><a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" time_added="1490988700" tags="">An Illustrated Guide to the Kaminsky DNS Vulnerability</a></li> | |
<li><a href="https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/" time_added="1490735366" tags="android">Owning OnePlus 3/3T with a Malicious Charger: The Last Piece of the Puzzle</a></li> | |
<li><a href="http://taviso.decsystem.org/books.html" time_added="1490104517" tags="">Books.</a></li> | |
<li><a href="https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/" time_added="1489518680" tags="andorid,android">Attacking Nexus 9 with Malicious Headphones</a></li> | |
<li><a href="http://blog.seekintoo.com/diy-smart-home-security-meh.html" time_added="1489246907" tags="">http://blog.seekintoo.com/diy-smart-home-security-meh.html</a></li> | |
<li><a href="http://blog.quarkslab.com/reverse-engineering-samsung-s6-sboot-part-i.html" time_added="1488861943" tags="">Reverse Engineering Samsung S6 SBOOT - Part I</a></li> | |
<li><a href="http://omergil.blogspot.com.au/2017/02/web-cache-deception-attack.html?m=1" time_added="1488215777" tags="">http://omergil.blogspot.com.au/2017/02/web-cache-deception-attack.html?m=1</a></li> | |
<li><a href="https://crypto.stanford.edu/~dabo/cryptobook/draft_0_3.pdf" time_added="1488154312" tags="crypto">https://crypto.stanford.edu/~dabo/cryptobook/draft_0_3.pdf</a></li> | |
<li><a href="https://medium.com/@kayrus/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.x1gm88l68" time_added="1487780924" tags="">https://medium.com/@kayrus/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.x1gm88l68</a></li> | |
<li><a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/" time_added="1487361855" tags="">Penetration Testing Tools Cheat Sheet</a></li> | |
<li><a href="http://stackoverflow.com/questions/24150030/storing-crc-into-an-axf-elf-file" time_added="1487109828" tags="">c - Storing CRC into an AXF/ELF file - Stack Overflow</a></li> | |
<li><a href="http://www.arachni-scanner.com/blog/arachnibrowser-js-data-flow-taint-tracing/" time_added="1487018231" tags="">Arachni::Browser: JS Data flow taint tracing - Arachni - Web Application Se</a></li> | |
<li><a href="https://insights.sei.cmu.edu/sei_blog/2017/02/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure.html" time_added="1486412663" tags="">https://insights.sei.cmu.edu/sei_blog/2017/02/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure.html</a></li> | |
<li><a href="http://www.synalysis.net/formats.xml" time_added="1486064857" tags="">The Grammar Page of Synalyze It!</a></li> | |
<li><a href="http://www.halfbakedmaker.org/blog/hcf4056-reveng" time_added="1485533656" tags="">Reverse engineering an HCF4056 BCD-to-7 segment decoder/driver chip from it</a></li> | |
<li><a href="https://alschwalm.com/blog/static/2017/01/24/reversing-c-virtual-functions-part-2-2/" time_added="1485437027" tags="">https://alschwalm.com/blog/static/2017/01/24/reversing-c-virtual-functions-part-2-2/</a></li> | |
<li><a href="http://www.halfdog.net/Security/" time_added="1485281730" tags="">Security-Related Activities</a></li> | |
<li><a href="https://githubengineering.com/githubs-post-csp-journey/" time_added="1485134182" tags="">https://githubengineering.com/githubs-post-csp-journey/</a></li> | |
<li><a href="https://www.evilsocket.net/2015/05/01/dynamically-inject-a-shared-library-into-a-running-process-on-androidarm/" time_added="1484968028" tags="">Dynamically Inject a Shared Library Into a Running Process on Android/ARM |</a></li> | |
<li><a href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf" time_added="1484765014" tags="">The Web Application Hacker's Handbook</a></li> | |
<li><a href="https://files.sans.org/summit/hackfest13/PDFs/Hacking%20Net%20Applications_PenTestSummit%20-%20James%20Jardine.pdf" time_added="1484764890" tags="">Hacking Net Applications_PenTestSummit - James Jardine.pdf</a></li> | |
<li><a href="https://www.researchgate.net/profile/Sebastian_Banescu/publication/311491954_Code_obfuscation_against_symbolic_execution_attacks/links/5849b78708ae82313e7108bf.pdf" time_added="1484522711" tags="">https://www.researchgate.net/profile/Sebastian_Banescu/publication/311491954_Code_obfuscation_against_symbolic_execution_attacks/links/5849b78708ae82313e7108bf.pdf</a></li> | |
<li><a href="https://cloud.google.com/security/security-design/" time_added="1484267786" tags="">Google Infrastructure Security Design Overview | Google Infrastructure Se</a></li> | |
<li><a href="https://getpocket.com/explore/item/what-romance-really-means-after-10-years-of-marriage-1189102354" time_added="1484244709" tags="">https://getpocket.com/explore/item/what-romance-really-means-after-10-years-of-marriage-1189102354</a></li> | |
<li><a href="https://www.youtube.com/watch?v=3RiGs08gtaY&feature=share" time_added="1484116182" tags="">https://www.youtube.com/watch?v=3RiGs08gtaY&feature=share</a></li> | |
<li><a href="https://labs.mwrinfosecurity.com/blog/when-biometric-access-control-devices-get-tcpip/" time_added="1484083768" tags="">Digital Lockpicking: Why Your Front Door Shouldn't Be On The Internet</a></li> | |
<li><a href="https://grsecurity.net/rap_faq.php" time_added="1484073620" tags="">grsecurity</a></li> | |
<li><a href="https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/" time_added="1484073561" tags="">SensePost | Exploiting ms16-098 rgnobj integer overflow on windows 8.1 x64 </a></li> | |
<li><a href="http://www.pagetable.com/?p=764" time_added="1483701042" tags="">http://www.pagetable.com/?p=764</a></li> | |
<li><a href="https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html?m=1" time_added="1483700517" tags="">https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html?m=1</a></li> | |
<li><a href="https://github.com/realnp/nvram_patcher/blob/master/nvram_patcher.c" time_added="1483292029" tags="">https://github.com/realnp/nvram_patcher/blob/master/nvram_patcher.c</a></li> | |
<li><a href="https://razygon.github.io/2016/09/23/iOS-kernel-heap-review-5-10/" time_added="1483052321" tags="ios">iOS kernel heap review 5-10 | Siyang's Depot</a></li> | |
<li><a href="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf" time_added="1482456852" tags="">https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf</a></li> | |
<li><a href="http://keenlab.tencent.com/en/2016/07/29/The-Journey-of-a-complete-OSX-privilege-escalation-with-a-single-vulnerability-Part-1/" time_added="1482272462" tags="">The Journey of a complete OSX privilege escalation with a single vulnerabil</a></li> | |
<li><a href="http://www.instructables.com/id/Bluetooth-Serial-Adapter-for-Pro-Mini/step2/Program-the-Bluetooth-transceiver/" time_added="1482026983" tags="">Bluetooth Serial Adapter for Pro Mini - 2</a></li> | |
<li><a href="https://rednaga.io/2016/09/21/reversing_go_binaries_like_a_pro/" time_added="1482006381" tags="">Reversing GO binaries like a pro | RedNaga Security</a></li> | |
<li><a href="https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/" time_added="1481940650" tags="">postMessage XSS on a million sites</a></li> | |
<li><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2" time_added="1481854875" tags="">965 - XNU kernel UaF due to lack of locking in set_dp_control_port - projec</a></li> | |
<li><a href="http://www.slideshare.net/codeblue_jp/master-canary-forging-by-yuki-koike-code-blue-2015" time_added="1481831142" tags="">Master Canary Forging by Yuki Koike - CODE BLUE 2015</a></li> | |
<li><a href="http://wapiflapi.github.io/2014/11/17/hacklu-oreo-with-ret2dl-resolve/" time_added="1481831139" tags="">Hack.lu's OREO with ret2dl-resolve · @wapiflapi</a></li> | |
<li><a href="http://netsec.ccert.edu.cn/wp-content/uploads/2015/10/2015-1029-yangkun-Gold-Mining-CTF.pdf" time_added="1481831102" tags="">掘金CTF</a></li> | |
<li><a href="http://tigress.cs.arizona.edu/" time_added="1481591161" tags="">tigress.cs.arizona.edu</a></li> | |
<li><a href="http://xillybus.com/tutorials/pci-express-tlp-pcie-primer-tutorial-guide-1" time_added="1481569614" tags="">Down to the TLP: How PCI express devices talk (Part I) | xillybus.com</a></li> | |
<li><a href="https://medium.freecodecamp.com/10-tips-to-maximize-your-javascript-debugging-experience-b69a75859329#.qiqq3v9u2" time_added="1481312455" tags="chrome">Things you probably didn’t know you could do with Chrome’s Developer Consol</a></li> | |
<li><a href="https://sysdig.com/blog/selinux-seccomp-falco-technical-discussion/" time_added="1481308642" tags="">Sysdig | SELinux, Seccomp, Falco, and You: A Technical Discussion</a></li> | |
<li><a href="https://jbme.qwertyoruiop.com/" time_added="1481221352" tags="">https://jbme.qwertyoruiop.com/</a></li> | |
<li><a href="http://documents.trendmicro.com/assets/pdf/shell-on-earth.pdf" time_added="1480783017" tags="">http://documents.trendmicro.com/assets/pdf/shell-on-earth.pdf</a></li> | |
<li><a href="http://homes.cs.washington.edu/~bholt/posts/llvm-debugging.html" time_added="1480707028" tags="llvm">Brandon Holt / LLVM Debugging Tips and Tricks</a></li> | |
<li><a href="https://web.archive.org/web/20160307114211/http://jamesmolloy.co.uk/tutorial_html/index.html" time_added="1480531795" tags="kernel,linux">JamesM's kernel development tutorials</a></li> | |
<li><a href="https://doar-e.github.io/blog/2016/11/27/clang-and-passes/" time_added="1480436097" tags="">https://doar-e.github.io/blog/2016/11/27/clang-and-passes/</a></li> | |
<li><a href="https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md" time_added="1480436070" tags="">https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md</a></li> | |
<li><a href="https://en.m.wikipedia.org/wiki/Survival_of_the_Sickest_(book)" time_added="1480208628" tags="">https://en.m.wikipedia.org/wiki/Survival_of_the_Sickest_(book)</a></li> | |
<li><a href="http://xkcd.com/341/" time_added="1480183861" tags="">http://xkcd.com/341/</a></li> | |
<li><a href="https://www.amazon.com/ap/signin?_encoding=UTF8&openid.assoc_handle=anywhere_v2_us&openid.claimed_id=http://specs.openid.net/auth/2.0/identifier_select&openid.identity=http://specs.openid.net/auth/2.0/identifier_select&openid.mode=checkid_setup&openid.ns=http://specs.openid.net/auth/2.0&openid.ns.pape=http://specs.openid.net/extensions/pape/1.0&openid.pape.max_auth_age=0&openid.return_to=https://www.amazon.com/gp/aw/psi.html?ie=UTF8&cartID=154-7136015-4782555&destinationURL=%2Fgp%2Faw%2Fya&packedQuery=ref_%7Cnavm_hdr_profile&pageId=anywhere_us&tag=rnwap-20" time_added="1480113732" tags="">https://www.amazon.com/ap/signin?_encoding=UTF8&openid.assoc_handle=anywhere_v2_us&openid.claimed_id=http://specs.openid.net/auth/2.0/identifier_select&openid.identity=http://specs.openid.net/auth/2.0/identifier_select&openid.mode=checkid_setup&openid.ns=http://specs.openid.net/auth/2.0&openid.ns.pape=http://specs.openid.net/extensions/pape/1.0&openid.pape.max_auth_age=0&openid.return_to=https://www.amazon.com/gp/aw/psi.html?ie=UTF8&cartID=154-7136015-4782555&destinationURL=%2Fgp%2Faw%2Fya&packedQuery=ref_%7Cnavm_hdr_profile&pageId=anywhere_us&tag=rnwap-20</a></li> | |
<li><a href="http://elasticsheep.com/2010/04/teensy2-usb-mass-storage-with-an-sd-card/" time_added="1479958822" tags="">Teensy2 USB Mass Storage with an SD card</a></li> | |
<li><a href="http://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html?m=1" time_added="1479844860" tags="">http://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html?m=1</a></li> | |
<li><a href="https://github.com/Dor1s/libfuzzer-workshop" time_added="1479844470" tags="">https://github.com/Dor1s/libfuzzer-workshop</a></li> | |
<li><a href="http://harrisonhjones.com/2014/07/15/reverse-bluetooth-keyboard/" time_added="1479529842" tags="bluetooth,keyboard">Harrison H. Jones » Reverse Bluetooth Keyboard</a></li> | |
<li><a href="https://excess-xss.com/" time_added="1479412287" tags="">Excess XSS: A comprehensive tutorial on cross-site scripting</a></li> | |
<li><a href="http://ramtin-amin.fr/#nvmepcie" time_added="1479406482" tags="">http://ramtin-amin.fr/#nvmepcie</a></li> | |
<li><a href="https://www.utdallas.edu/~zxl111930/file/Rewards_NDSS10.pdf" time_added="1479168495" tags="">https://www.utdallas.edu/~zxl111930/file/Rewards_NDSS10.pdf</a></li> | |
<li><a href="https://www.usenix.org/legacy/event/woot11/tech/final_files/Oakley.pdf" time_added="1479166506" tags="">https://www.usenix.org/legacy/event/woot11/tech/final_files/Oakley.pdf</a></li> | |
<li><a href="https://tia.mat.br/posts/2016/11/08/infect_to_protect.html" time_added="1479075656" tags="">Infect to Protect — Leandro Pereira</a></li> | |
<li><a href="https://pzemtsov.github.io/2016/11/06/bug-story-alignment-on-x86.html" time_added="1479075524" tags="">A bug story: data alignment on x86</a></li> | |
<li><a href="https://media.blackhat.com/bh-us-12/Briefings/Forshaw/BH_US_12_Forshaw_Are_You_My_Type_WP.pdf" time_added="1478416237" tags="">BH_US_12_Forshaw_Are_You_My_Type_WP.pdf</a></li> | |
<li><a href="https://insinuator.net/2016/10/linq-injection-from-attacking-filters-to-code-execution/" time_added="1478416009" tags="">Linq Injection – From Attacking Filters to Code Execution – Insinuator.net</a></li> | |
<li><a href="http://tukan.farm/2016/11/03/once-upon-a-realloc/" time_added="1478181972" tags="">http://tukan.farm/2016/11/03/once-upon-a-realloc/</a></li> | |
<li><a href="https://hackerone.com/reports/178152" time_added="1478181550" tags="">https://hackerone.com/reports/178152</a></li> | |
<li><a href="https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf" time_added="1478181516" tags="">https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf</a></li> | |
<li><a href="https://speakerdeck.com/flankerhqd/the-python-bites-your-apple-fuzzing-and-exploiting-osx-kernel-bugs" time_added="1478030710" tags="">The Python bites your apple - fuzzing and exploiting OSX Kernel bugs // Spe</a></li> | |
<li><a href="http://arstechnica.com/gadgets/2016/10/building-android-a-40000-word-history-of-googles-mobile-os/" time_added="1478015653" tags="">The (updated) history of Android | Ars Technica</a></li> | |
<li><a href="https://github.com/hasherezade/demos?files=1" time_added="1477833968" tags="">https://github.com/hasherezade/demos?files=1</a></li> | |
<li><a href="https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/" time_added="1477833561" tags="">https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/</a></li> | |
<li><a href="https://www.invincealabs.com/blog/2016/10/pixhawk-firmware-hooking/" time_added="1477582858" tags="">Invincea Labs</a></li> | |
<li><a href="https://www.martijnlibbrecht.nu/2/" time_added="1477456560" tags="">Blog - Martijn Libbrecht</a></li> | |
<li><a href="http://keenlab.tencent.com/en/2016/07/22/WindowServer-The-privilege-chameleon-on-macOS-Part-1/" time_added="1477428184" tags="">WindowServer: The privilege chameleon on macOS (Part 1) | Keen Security Lab</a></li> | |
<li><a href="https://www.exploit-db.com/docs/39527.pdf" time_added="1477416523" tags="">39527.pdf</a></li> | |
<li><a href="https://www.cl.cam.ac.uk/~pes20/rems/papers/oopsla-elf-linking-2016.pdf" time_added="1477362514" tags="">oopsla-elf-linking-2016.pdf</a></li> | |
<li><a href="http://dbp-consulting.com/tutorials/debugging/linuxProgramStartup.html" time_added="1477192438" tags="linux">Linux x86 Program Start Up</a></li> | |
<li><a href="http://jarmoc.com/blog/2013/05/28/ror-cve-2013-0156-in-the-wild/" time_added="1477006147" tags="">RoR CVE-2013-0156 In the Wild - Jarmoc.com</a></li> | |
<li><a href="http://secalert.net/slack-security-bug-bounty.html" time_added="1476984442" tags="">secalert on security</a></li> | |
<li><a href="http://www.antenna-theory.com/" time_added="1476928296" tags="">The Antenna Theory Website</a></li> | |
<li><a href="http://www.syssec-project.eu/m/page-media/158/syssec-summer-school-Evading-Emulator.pdf" time_added="1476786751" tags="">http://www.syssec-project.eu/m/page-media/158/syssec-summer-school-Evading-Emulator.pdf</a></li> | |
<li><a href="https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.7-Bypassing-Sandboxes-for-Fun.pdf" time_added="1476786664" tags="">https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.7-Bypassing-Sandboxes-for-Fun.pdf</a></li> | |
<li><a href="https://github.com/ud2/advisories/blob/2d5072e7f678582eab3fb68806bd02584dfad2c5/osx/graveyard/cve-2015-3777/xpc_blued_overflow1.c" time_added="1476207064" tags="">https://github.com/ud2/advisories/blob/2d5072e7f678582eab3fb68806bd02584dfad2c5/osx/graveyard/cve-2015-3777/xpc_blued_overflow1.c</a></li> | |
<li><a href="https://media.blackhat.com/bh-us-10/presentations/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-slides.pdf" time_added="1476158758" tags="">Browser-Based Covert Data Exfiltration</a></li> | |
<li><a href="http://netsec.ws/?p=331" time_added="1476113851" tags="metasploit,shellcode">Creating Metasploit Payloads</a></li> | |
<li><a href="https://www.exploit-db.com/exploits/35742/" time_added="1475686583" tags="mach">Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation</a></li> | |
<li><a href="http://2013.zeronights.org/includes/docs/Meder_Kydyraliev_-_Mining_Mach_Services_within_OS_X_Sandbox.pdf" time_added="1475686504" tags="mach">Meder_Kydyraliev_-_Mining_Mach_Services_within_OS_X_Sandbox.pdf</a></li> | |
<li><a href="https://pdos.csail.mit.edu/6.828/2011/labs/lab6/" time_added="1475588781" tags="">https://pdos.csail.mit.edu/6.828/2011/labs/lab6/</a></li> | |
<li><a href="https://littleosbook.github.io/" time_added="1475587322" tags="">https://littleosbook.github.io/</a></li> | |
<li><a href="http://www.cs.sjsu.edu/~stamp/RUA/homophonic.pdf" time_added="1475257058" tags="">homophonic.pdf</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf" time_added="1475167489" tags="">https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf</a></li> | |
<li><a href="https://blog.flanker017.me/cve-2016-4697-buffer-overrun-in-macos-kernel-driver/" time_added="1474892054" tags="">https://blog.flanker017.me/cve-2016-4697-buffer-overrun-in-macos-kernel-driver/</a></li> | |
<li><a href="https://github.com/radareorg/r2con/blob/master/2016/trainings/05-avr-explotation/avrworkshop_r2con.pdf" time_added="1474841533" tags="exploit">r2con/avrworkshop_r2con.pdf at master · radareorg/r2con</a></li> | |
<li><a href="https://github.com/kpwn/935csbypass/blob/master/cs_bypass.m" time_added="1474790386" tags="">https://github.com/kpwn/935csbypass/blob/master/cs_bypass.m</a></li> | |
<li><a href="https://github.com/felixwilhelm/mario_baslr/" time_added="1474790327" tags="">https://github.com/felixwilhelm/mario_baslr/</a></li> | |
<li><a href="http://www.contextis.com/resources/blog/porting-exploits-netgear-wnr2200/" time_added="1474573665" tags="">Porting exploits to a Netgear WNR2200</a></li> | |
<li><a href="http://memory-analysis.rekall-forensic.com/www/TOC/" time_added="1474463275" tags="">http://memory-analysis.rekall-forensic.com/www/TOC/</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-16/materials/us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root-wp.pdf" time_added="1474380765" tags="">https://www.blackhat.com/docs/us-16/materials/us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root-wp.pdf</a></li> | |
<li><a href="http://www.zdziarski.com/blog/?p=6015" time_added="1474377305" tags="">http://www.zdziarski.com/blog/?p=6015</a></li> | |
<li><a href="https://deadcode.me/blog/2016/09/02/Blind-Java-Deserialization-Commons-Gadgets.html" time_added="1474253790" tags="java">Blind Java Deserialization Vulnerability - Commons Gadgets</a></li> | |
<li><a href="https://deadcode.me/blog/2016/09/18/Blind-Java-Deserialization-Part-II.html" time_added="1474253519" tags="java">Blind Java Deserialization - Part II - exploitation rev 2</a></li> | |
<li><a href="https://www.tu-braunschweig.de/Medien-DB/sec/pubs/2016-ccs.pdf" time_added="1474252229" tags="">Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to </a></li> | |
<li><a href="https://github.com/michalmalik/linux-re-101/blob/master/README.md" time_added="1474251314" tags="">linux-re-101/README.md at master · michalmalik/linux-re-101</a></li> | |
<li><a href="https://github.com/nccgroup/featherduster" time_added="1474237026" tags="">nccgroup/featherduster: An automated, modular cryptanalysis tool</a></li> | |
<li><a href="http://arunsureshkumar.me/index.php/2016/09/16/facebook-page-takeover-zero-day-vulnerability/" time_added="1474210970" tags="bug bounty">Facebook Page Takeover – Zero Day Vulnerability – Arun Sureshkumar</a></li> | |
<li><a href="http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/" time_added="1474171699" tags="">http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/</a></li> | |
<li><a href="https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png" time_added="1474155349" tags="exploit heap">heap.png (4350×2247)</a></li> | |
<li><a href="http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/" time_added="1474033507" tags="">http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/</a></li> | |
<li><a href="http://imrannazar.com/GameBoy-Emulation-in-JavaScript" time_added="1473875137" tags="emulation">Imran Nazar: GameBoy Emulation in JavaScript: The CPU</a></li> | |
<li><a href="https://www.usenix.org/conference/woot13/workshop-program/presentation/Shapiro" time_added="1473815581" tags="elf">“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata | USE</a></li> | |
<li><a href="http://security.cs.rpi.edu/courses/hwre-spring2014/" time_added="1473738194" tags="">CSCI 4974 / 6974 Hardware Reverse Engineering</a></li> | |
<li><a href="https://github.com/0xAX/linux-insides/blob/master/Misc/program_startup.md" time_added="1473653496" tags="">https://github.com/0xAX/linux-insides/blob/master/Misc/program_startup.md</a></li> | |
<li><a href="https://m.youtube.com/watch?v=Svm5V4leEho" time_added="1473653399" tags="">https://m.youtube.com/watch?v=Svm5V4leEho</a></li> | |
<li><a href="https://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/" time_added="1473630350" tags="web">Abusing JSONP with Rosetta Flash</a></li> | |
<li><a href="http://demo-effects.sourceforge.net/" time_added="1473360212" tags="">The Demo Effects Collection</a></li> | |
<li><a href="http://sektioneins.de/en/blog/16-09-05-pegasus-ios-kernel-vulnerability-explained-part-2.html" time_added="1473167964" tags="exploit,mac">PEGASUS iOS Kernel Vulnerability Explained - Part 2 | SektionEins GmbH</a></li> | |
<li><a href="https://media.blackhat.com/bh-us-11/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf" time_added="1472966907" tags="">https://media.blackhat.com/bh-us-11/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf</a></li> | |
<li><a href="https://github.com/NoviceLive/research-rootkit?utm_content=bufferca60c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer" time_added="1472966809" tags="">https://github.com/NoviceLive/research-rootkit?utm_content=bufferca60c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer</a></li> | |
<li><a href="https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45542.pdf" time_added="1472966772" tags="">https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45542.pdf</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-16/materials/us-16-Adrian-A-Retrospective-On-The-Use-of-Export-Cryptography.pdf" time_added="1472966332" tags="">https://www.blackhat.com/docs/us-16/materials/us-16-Adrian-A-Retrospective-On-The-Use-of-Export-Cryptography.pdf</a></li> | |
<li><a href="https://bazad.github.io/2016/05/mac-os-x-use-after-free/" time_added="1472835080" tags="">https://bazad.github.io/2016/05/mac-os-x-use-after-free/</a></li> | |
<li><a href="http://newosxbook.com/files/HITSB.pdf" time_added="1472435350" tags="">http://newosxbook.com/files/HITSB.pdf</a></li> | |
<li><a href="http://www.payatu.com/uninitialized-stack-variable/" time_added="1472420504" tags="">http://www.payatu.com/uninitialized-stack-variable/</a></li> | |
<li><a href="http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/avoid-race.html" time_added="1472355711" tags="exploit,vulnerabilities">Avoid Race Conditions</a></li> | |
<li><a href="https://papers.put.as/papers/macosx/2015/OSXScale.pdf" time_added="1472355528" tags="fuzz,fuzzing,mac">https://papers.put.as/papers/macosx/2015/OSXScale.pdf</a></li> | |
<li><a href="https://paragonie.com/blog/2016/08/on-insecurity-popular-open-source-php-cms-platforms" time_added="1472166364" tags="bug bounty,web">On the (in)security of popular open source Content Management Systems writt</a></li> | |
<li><a href="http://stackoverflow.com/questions/5741187/sql-injection-that-gets-around-mysql-real-escape-string/12118602#12118602" time_added="1472166349" tags="sql injection,web">php - SQL injection that gets around mysql_real_escape_string() - Stack Ove</a></li> | |
<li><a href="https://medium.com/@mnakamura1337/reverse-engineering-visual-novels-101-d0bc3bf7ab8#.r4uzykqus" time_added="1472150351" tags="reverse">Reverse engineering visual novels 101 – Medium</a></li> | |
<li><a href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/" time_added="1471643399" tags="bug bounty">High frequency security bug hunting: 120 days, 120 bugs</a></li> | |
<li><a href="http://m.imgur.com/a/5ZtYn" time_added="1471569807" tags="keyboards">http://m.imgur.com/a/5ZtYn</a></li> | |
<li><a href="https://labs.mwrinfosecurity.com/blog/usb-fuzzing-for-the-masses/" time_added="1471466351" tags="exploit,usb">USB Fuzzing for the Masses</a></li> | |
<li><a href="https://www.exploit-db.com/papers/13176/" time_added="1470953471" tags="exploit,mac,mach">Vulnerability analysis, Security Papers, Exploit Tutorials - Part 13176</a></li> | |
<li><a href="http://shakthimaan.com/downloads/hurd/A.Programmers.Guide.to.the.Mach.System.Calls.pdf" time_added="1470337015" tags="mac,mach,osx">A.Programmers.Guide.to.the.Mach.System.Calls.pdf</a></li> | |
<li><a href="https://reverse.put.as/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/" time_added="1470187276" tags="exploit,osx">Shut up snitch! - reverse engineering and exploiting a critical Little Snit</a></li> | |
<li><a href="http://newosxbook.com/articles/HIDeAndSeek.html" time_added="1470172928" tags="ios,jailbreak">HIDden treasures - The Annotated (informal) Guide to TaiG - the untether</a></li> | |
<li><a href="http://newosxbook.com/articles/TaiG.html#iOS" time_added="1470172913" tags="ios,jailbreak">The Annotated Informal Guide to TaiG</a></li> | |
<li><a href="http://m.mentalfloss.com/article.php?id=80043&utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1466704893" tags="">http://m.mentalfloss.com/article.php?id=80043&utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://www.binsim.com/" time_added="1466437422" tags="">http://www.binsim.com/</a></li> | |
<li><a href="https://m.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640" time_added="1466177370" tags="bug bounty,web">https://m.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640</a></li> | |
<li><a href="https://blog.stratumsecurity.com/2016/06/13/websockets-auth/" time_added="1466036369" tags="web,websockets">Journey into WebSockets Authentication/Authorization</a></li> | |
<li><a href="https://www.blackhat.com/presentations/bh-usa-08/Stewart/BH_US_08_Stewart_Protocols_of_the_Storm.pdf" time_added="1465890088" tags="a,blackhat,malware">Protocols and Encryption of the Storm Botnet</a></li> | |
<li><a href="http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/" time_added="1465767565" tags="">Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The W</a></li> | |
<li><a href="http://nshipster.com/inter-process-communication/" time_added="1465506061" tags="ipc,mac">Inter-Process Communication - NSHipster</a></li> | |
<li><a href="http://blog.wuntee.sexy/CVE-2015-3795/" time_added="1465505954" tags="exploit,kernel,mac">CVE-2015-3795 · blog[wuntee]</a></li> | |
<li><a href="http://weis2016.econinfosec.org/wp-content/uploads/sites/2/2015/08/WEIS_2016_paper_76.pdf" time_added="1465415704" tags="bug bounty,web">WEIS_2016_paper_76.pdf</a></li> | |
<li><a href="http://joystick.artificialstudios.org/pubs/eurosec14.pdf" time_added="1465415609" tags="exploit,kernel,mac">eurosec14.pdf</a></li> | |
<li><a href="https://www.syscan360.org/slides/2012_EN_FindYourOwniOSKernelBug_XuHao_ChenXiaobo.pdf" time_added="1465415598" tags="exploit,kernel,mac">2012_EN_FindYourOwniOSKernelBug_XuHao_ChenXiaobo.pdf</a></li> | |
<li><a href="http://blog.malerisch.net/2013/09/burpcsj-tutorial-using-crawljax.html" time_added="1465415587" tags="burp,web">malerisch.net: BurpCSJ Tutorial - Using Crawljax</a></li> | |
<li><a href="http://resources.infosecinstitute.com/burps-session-handling-mechanisms/" time_added="1465415539" tags="burp,web">Burp Suite Tutorial: Session Handling Mechanisms - InfoSec Resources</a></li> | |
<li><a href="https://github.com/iagox86/dnscat2" time_added="1465415525" tags="dns,web">iagox86/dnscat2</a></li> | |
<li><a href="http://googleprojectzero.blogspot.com/2014_11_01_archive.html" time_added="1465415489" tags="exploit,safari">Project Zero: November 2014</a></li> | |
<li><a href="https://conference.hitb.org/hitbsecconf2016ams/materials/D2T2%20-%20Richard%20Johnson%20-%20Go%20Speed%20Tracer%20-%20Guided%20Fuzzing.pdf" time_added="1465197694" tags="exploit,fuzzing">Go Speed Tracer - rjohnson.pptx</a></li> | |
<li><a href="https://github.com/flankerhqd/IOUSBHID-IOHID-Overflow/blob/master/README.md" time_added="1464931644" tags="">https://github.com/flankerhqd/IOUSBHID-IOHID-Overflow/blob/master/README.md</a></li> | |
<li><a href="https://ge0n0sis.github.io/posts/2016/05/how-to-lock-the-samsung-download-mode-using-an-undocumented-feature-of-aboot/" time_added="1464241023" tags="">How to lock the samsung download mode using an undocumented feature of aboo</a></li> | |
<li><a href="https://media.blackhat.com/bh-eu-12/Royal/bh-eu-12-Royal-Entrapment-WP.pdf" time_added="1463978362" tags="">bh-eu-12-Royal-Entrapment-WP.pdf</a></li> | |
<li><a href="http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/" time_added="1463550972" tags="">Magento – Unauthenticated Remote Code Execution – 0-Days And Life</a></li> | |
<li><a href="http://blog.dinaburg.org/2013/06/optimizevm-fast-windows-guests-for.html" time_added="1462317127" tags="">OptimizeVM: Fast Windows Guests for VMware | Artem Dinaburg's Blog</a></li> | |
<li><a href="https://mazinahmed.net/uploads/Evading%20All%20Web-Application%20Firewalls%20XSS%20Filters.pdf" time_added="1462139167" tags="">Evading All Web-Application Firewalls XSS Filters.pdf</a></li> | |
<li><a href="https://eucalypt-forest.ctfcompetition.com/qwerty" time_added="1461953771" tags="">https://eucalypt-forest.ctfcompetition.com/qwerty</a></li> | |
<li><a href="https://blog.coresecurity.com/2016/04/25/exploiting-internet-explorers-ms15-106-part-i-vbscript-filter-type-confusion-vulnerability-cve-2015-6055/" time_added="1461630824" tags="">Exploiting Internet Explorer’s MS15-106, Part I: VBScript Filter Type Confu</a></li> | |
<li><a href="https://crypto.stanford.edu/pbc/notes/" time_added="1461351202" tags="">Ben Lynn - Notes</a></li> | |
<li><a href="http://cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf" time_added="1461187852" tags="">cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf</a></li> | |
<li><a href="https://insights.sei.cmu.edu/cert/2012/04/cert-linux-triage-tools-10-released.html" time_added="1460141274" tags="">CERT Linux Triage Tools 1.0 Released</a></li> | |
<li><a href="http://panamapapers.sueddeutsche.de/articles/56febfc0a1bb8d3c3495adf0/" time_added="1459827168" tags="">panamapapers.sueddeutsche.de/articles/56febfc0a1bb8d3c3495adf0/</a></li> | |
<li><a href="https://www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/" time_added="1458590218" tags="">Memory Corruption Vulnerability in "libotr"</a></li> | |
<li><a href="http://www.scs.stanford.edu/~abelay/pdf/bittau:brop.pdf" time_added="1458449540" tags="">http://www.scs.stanford.edu/~abelay/pdf/bittau:brop.pdf</a></li> | |
<li><a href="http://cturt.github.io/ps4.html" time_added="1457800964" tags="">Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP</a></li> | |
<li><a href="http://phrack.org/issues/66/10.html" time_added="1457721327" tags="">.:: Phrack Magazine ::.</a></li> | |
<li><a href="https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/" time_added="1457721319" tags="">Exploit Writing Tutorial Part 10 : Chaining DEP With ROP – The Rubik’s[TM] </a></li> | |
<li><a href="https://web.archive.org/web/20140929030339/http://felixcloutier.com/greenhorn" time_added="1457721288" tags="">Greenhorn–the anatomy of a Windows 8 program exploit</a></li> | |
<li><a href="https://embed.cs.utah.edu/csmith/using.html" time_added="1457631149" tags="">Using Csmith</a></li> | |
<li><a href="https://wiki.skullsecurity.org/index.php?title=Example_7" time_added="1457630481" tags="">Example 7 - SkullSecurity</a></li> | |
<li><a href="http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/" time_added="1457623768" tags="">http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/</a></li> | |
<li><a href="https://blog.exodusintel.com/2016/02/10/firewall-hacking/" time_added="1457549550" tags="">Execute My Packet | Exodus Intelligence</a></li> | |
<li><a href="https://guidovranken.wordpress.com/2016/03/01/public-disclosure-malformed-private-keys-lead-to-heap-corruption-in-b2i_pvk_bio/" time_added="1457469186" tags="">Public disclosure: malformed private keys lead to heap corruption in OpenSS</a></li> | |
<li><a href="http://blog.ioactive.com/?m=1" time_added="1456371859" tags="">http://blog.ioactive.com/?m=1</a></li> | |
<li><a href="http://raspberrypi.stackexchange.com/questions/23839/interfacing-with-a-winbond-w25q64bv-flash-chip-via-spi" time_added="1456329231" tags="">python - Interfacing with a Winbond W25Q64BV flash chip via SPI - Raspberry</a></li> | |
<li><a href="http://www.cs.sjsu.edu/faculty/stamp/crypto/PowerPoint_PDF/16_MD5.pdf" time_added="1456286751" tags="">16_MD5.ppt</a></li> | |
<li><a href="http://www.iste.uni-stuttgart.de/fileadmin/user_upload/iste/zss/publications/supplementaryMaterial/2014-FSE-IncludingErrata.pdf" time_added="1455915964" tags="">http://www.iste.uni-stuttgart.de/fileadmin/user_upload/iste/zss/publications/supplementaryMaterial/2014-FSE-IncludingErrata.pdf</a></li> | |
<li><a href="http://www.loyalty.org/~schoen/rsa/" time_added="1455912816" tags="">Understanding Common Factor Attacks: An RSA-Cracking Puzzle</a></li> | |
<li><a href="http://pocket.co/soC6lN?cta=1" time_added="1455307111" tags="">http://pocket.co/soC6lN?cta=1</a></li> | |
<li><a href="http://beej.us/guide/bgipc/output/html/multipage/index.html" time_added="1454392180" tags="">Beej's Guide to Unix IPC</a></li> | |
<li><a href="http://repository.cmu.edu/cgi/viewcontent.cgi?article=1233&context=ece" time_added="1454210840" tags="">viewcontent.cgi</a></li> | |
<li><a href="https://github.com/spender-sandbox/cuckoo-modified" time_added="1454209773" tags="">spender-sandbox/cuckoo-modified: Modified edition of cuckoo</a></li> | |
<li><a href="http://www.sift.net/sites/default/files/publications/icds_2015_4_40_10108%20(2).pdf" time_added="1454034487" tags="">http://www.sift.net/sites/default/files/publications/icds_2015_4_40_10108%20(2).pdf</a></li> | |
<li><a href="https://www.whitehatters.academy/intro-to-kernel-exploitation-part-1/" time_added="1454033178" tags="">Intro to Windows kernel exploitation 1/N: Kernel Debugging</a></li> | |
<li><a href="https://robert.sesek.com/2012/1/debugging_mach_ports.html" time_added="1453853520" tags="">Debugging Mach Ports - Robert Sesek</a></li> | |
<li><a href="https://hal.archives-ouvertes.fr/hal-01193025/document" time_added="1453614484" tags="">https://hal.archives-ouvertes.fr/hal-01193025/document</a></li> | |
<li><a href="http://blogs.msdn.com/b/ntdebugging/archive/2016/01/22/virtual-machine-managment-hangs-on-windows-server-2012-r2-hyper-v-host.aspx" time_added="1453574146" tags="">http://blogs.msdn.com/b/ntdebugging/archive/2016/01/22/virtual-machine-managment-hangs-on-windows-server-2012-r2-hyper-v-host.aspx</a></li> | |
<li><a href="http://vulnfactory.org/blog/2011/06/05/smep-what-is-it-and-how-to-beat-it-on-linux/" time_added="1453329704" tags="">Security Research by Dan Rosenberg</a></li> | |
<li><a href="https://github.com/rmusser01/Infosec_Reference/blob/96fc94d3bbdf19802f7ee1dc14d8e267dd717d36/Draft/Draft/Exploit%20Development.md" time_added="1452786724" tags="">Infosec_Reference/Exploit Development.md at 96fc94d3bbdf19802f7ee1dc14d8e26</a></li> | |
<li><a href="https://www.youtube.com/watch?v=N7EV4Q-OPBk" time_added="1452049646" tags="">Black Hat USA 2010: Understanding Fragmentation Heap: From Allocation to Ex</a></li> | |
<li><a href="https://fail0verflow.com/blog/2014/plaidctf2014-for450-rsa.html" time_added="1452033347" tags="">fail0verflow :: plaidCTF 2014 - rsa (for450)</a></li> | |
<li><a href="https://kitctf.de/writeups/32c3ctf/ranger/" time_added="1452006748" tags="">https://kitctf.de/writeups/32c3ctf/ranger/</a></li> | |
<li><a href="http://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/" time_added="1452006287" tags="">http://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/</a></li> | |
<li><a href="http://hdwsec.fr/blog/CVE-2015-0057.html" time_added="1451627133" tags="">HDW Sec - Blog</a></li> | |
<li><a href="http://www.cs.sjsu.edu/faculty/stamp/papers/topics/topic1/teja.pdf" time_added="1451626867" tags="">www.cs.sjsu.edu/faculty/stamp/papers/topics/topic1/teja.pdf</a></li> | |
<li><a href="http://intothesymmetry.blogspot.ch/2015/12/top-10-oauth-2-implementation.html?m=1" time_added="1450553223" tags="">http://intothesymmetry.blogspot.ch/2015/12/top-10-oauth-2-implementation.html?m=1</a></li> | |
<li><a href="http://sas2015.inria.fr/sas_invited_talk.pdf" time_added="1450474312" tags="">http://sas2015.inria.fr/sas_invited_talk.pdf</a></li> | |
<li><a href="http://blogs.flexerasoftware.com/vulnerability-management/2015/04/yet-another-windows-gdi-story.html" time_added="1450296167" tags="">Software Vulnerability Management: Yet Another Windows GDI Story</a></li> | |
<li><a href="https://secunia.com/blog/in-memory-of-a-zero-day--ms13-051-385/" time_added="1450296165" tags="">In memory of a zero-day - MS13-051</a></li> | |
<li><a href="http://patater.com/files/projects/manual/manual.html" time_added="1450252582" tags="">Introduction to Nintendo DS Programming</a></li> | |
<li><a href="https://lkml.org/lkml/2015/12/14/252" time_added="1450192139" tags="">https://lkml.org/lkml/2015/12/14/252</a></li> | |
<li><a href="https://faculty.ist.psu.edu/wu/papers/TaintPipe.pdf" time_added="1450191867" tags="">https://faculty.ist.psu.edu/wu/papers/TaintPipe.pdf</a></li> | |
<li><a href="http://en.wooyun.io/2015/12/08/33.html" time_added="1449777022" tags="">Obfuscation to Defeat Static and Dynamic Analysis Tools Using 32-bit/64-bit</a></li> | |
<li><a href="http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/" time_added="1449538399" tags="">Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege e</a></li> | |
<li><a href="http://intothesymmetry.blogspot.it/2015/12/a-quick-glance-at-modern-browserss.html" time_added="1449530421" tags="">Into the symmetry: A Quick Glance at Modern Browsers's Protection Part #1</a></li> | |
<li><a href="http://nsl.cs.columbia.edu/projects/minestrone/papers/outofcontrol_oakland14.pdf" time_added="1449269917" tags="">nsl.cs.columbia.edu/projects/minestrone/papers/outofcontrol_oakland14.pdf</a></li> | |
<li><a href="http://dreamsofastone.blogspot.de/2015/11/rowbuffer-side-channel-attacks.html?m=1" time_added="1448818343" tags="">http://dreamsofastone.blogspot.de/2015/11/rowbuffer-side-channel-attacks.html?m=1</a></li> | |
<li><a href="http://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html" time_added="1448506095" tags="">Deobfuscation: recovering an OLLVM-protected program</a></li> | |
<li><a href="https://labs.portcullis.co.uk/blog/windows-named-pipes-there-and-back-again/" time_added="1448158855" tags="">https://labs.portcullis.co.uk/blog/windows-named-pipes-there-and-back-again/</a></li> | |
<li><a href="https://www.exploit-db.com/exploits/38616/" time_added="1447825028" tags="">Python 2.7 array.fromstring Method - Use After Free - Exploits Database</a></li> | |
<li><a href="http://ho.ax/posts/2012/02/vmware-hardware-debugging/" time_added="1447819761" tags="">ho.ax - VMware debugging II: "Hardware" debugging</a></li> | |
<li><a href="http://resources.infosecinstitute.com/exploiting-linux-kernel-heap-corruptions-slub-allocator/" time_added="1447814328" tags="">Exploiting Linux Kernel Heap Corruptions (SLUB Allocator) - InfoSec Resourc</a></li> | |
<li><a href="https://onebitbug.me/2011/03/04/introducing-linux-kernel-symbols/" time_added="1447812087" tags="">Introducing Linux Kernel Symbols</a></li> | |
<li><a href="https://t.co/n9fLKMTc02?ssr=true" time_added="1447610225" tags="">https://t.co/n9fLKMTc02?ssr=true</a></li> | |
<li><a href="http://ho.ax/tag/lldb/" time_added="1447484409" tags="">ho.ax -</a></li> | |
<li><a href="https://www.endgame.com/blog/adobe-flash-vulnerability-cve-2015-7663-and-mitigating-exploits" time_added="1447255333" tags="">https://www.endgame.com/blog/adobe-flash-vulnerability-cve-2015-7663-and-mitigating-exploits</a></li> | |
<li><a href="http://www.slideshare.net/mobile/LiangChen13/poc2015-os-xkernelisasstrongasitsweakestpartliangshuaitian" time_added="1447168074" tags="">http://www.slideshare.net/mobile/LiangChen13/poc2015-os-xkernelisasstrongasitsweakestpartliangshuaitian</a></li> | |
<li><a href="http://sattia.blogspot.com/2014/04/exploiting-linux-kernel-heap.html" time_added="1446945358" tags="">Sameh Attia: Exploiting Linux Kernel Heap Corruptions (SLUB Allocator)</a></li> | |
<li><a href="http://redstack.net/blog/linux-kernel-2631-perf_counter_open-exploit.html#disqus_thread" time_added="1446791597" tags="">Linux kernel 2.6.31 perf_counter_open exploit</a></li> | |
<li><a href="http://jasindods.com/green/enlightenment/" time_added="1446779642" tags="">Index of /green/enlightenment</a></li> | |
<li><a href="https://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/" time_added="1446705452" tags="">Exploiting CVE-2015-0311: A Use-After-Free in Adobe Flash Player | Core Sec</a></li> | |
<li><a href="http://www.phrack.org/papers/self-patching-msxml.html" time_added="1446705353" tags="">.:: Phrack Magazine ::.</a></li> | |
<li><a href="http://cryptool.hgi.rub.de/index.html" time_added="1446562001" tags="">http://cryptool.hgi.rub.de/index.html</a></li> | |
<li><a href="https://marcan.st/2015/10/rescuing-a-broken-ntfs-filesystem/" time_added="1445868609" tags="">https://marcan.st/2015/10/rescuing-a-broken-ntfs-filesystem/</a></li> | |
<li><a href="http://webcache.googleusercontent.com/search?q=cache:6N65WeUBdnYJ:acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/+&cd=1&hl=en&ct=clnk&gl=us" time_added="1445454203" tags="">CTF Writeup - HITCON CTF 2014 stkof or the "unexploitable" heap overflow ?</a></li> | |
<li><a href="http://webcache.googleusercontent.com/search?q=cache:yxC8GhtiWFEJ:acez.re/ctf-writeup-brad-oberbeg/+&cd=1&hl=en&ct=clnk&gl=us" time_added="1445454200" tags="">CTF Writeup - CSAW Finals 2013 Brad Oberberg</a></li> | |
<li><a href="http://www.contextis.com/documents/120/Glibc_Adventures-The_Forgotten_Chunks.pdf" time_added="1445447819" tags="">www.contextis.com/documents/120/Glibc_Adventures-The_Forgotten_Chunks.pdf</a></li> | |
<li><a href="http://luismiras.github.io/muymacho-exploiting_DYLD_ROOT_PATH/" time_added="1445315334" tags="">muymacho - exploiting DYLD_ROOT_PATH</a></li> | |
<li><a href="http://bottomupcs.com/elf.html" time_added="1444953772" tags="">ELF</a></li> | |
<li><a href="https://www.plcrashreporter.org/documentation/api/v1.2-beta1/mach_exceptions.html" time_added="1444849066" tags="">Plausible CrashReporter: Mach Exceptions on Mac OS X and iOS</a></li> | |
<li><a href="http://www.codeproject.com/Articles/70302/Redirecting-functions-in-shared-ELF-libraries" time_added="1444849055" tags="">Redirecting functions in shared ELF libraries - CodeProject</a></li> | |
<li><a href="https://labs.portcullis.co.uk/blog/cve-2015-5119-flash-bytearray-uaf-a-beginners-walkthrough/" time_added="1443372048" tags="">https://labs.portcullis.co.uk/blog/cve-2015-5119-flash-bytearray-uaf-a-beginners-walkthrough/</a></li> | |
<li><a href="https://github.com/smokeleeteveryday/CTF_WRITEUPS/blob/master/2015/MMACTF/reversing/simple_hash/README.md" time_added="1442854341" tags="">https://github.com/smokeleeteveryday/CTF_WRITEUPS/blob/master/2015/MMACTF/reversing/simple_hash/README.md</a></li> | |
<li><a href="http://talosintel.com/reports/TALOS-2015-0007/" time_added="1442589808" tags="">Talos Intel - Talos 2015 0007</a></li> | |
<li><a href="http://lockboxx.blogspot.com/2014/11/native-mac-os-x-application-mach-o.html" time_added="1442243572" tags="">LockBoxx: Native Mac OS X Application / Mach-O Backdoors for Pentesters</a></li> | |
<li><a href="https://www.cl.cam.ac.uk/~sps32/mcu_lock.html" time_added="1442183709" tags="">Breaking copy protection in microcontrollers</a></li> | |
<li><a href="http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide" time_added="1442122233" tags="">An Anti-Reverse Engineering Guide - CodeProject</a></li> | |
<li><a href="http://spareclockcycles.org/2012/02/14/stack-necromancy-defeating-debuggers-by-raising-the-dead/" time_added="1442119521" tags="antireversing,debugging">Spare Clock Cycles</a></li> | |
<li><a href="http://sandpile.org/" time_added="1442112545" tags="">http://sandpile.org/</a></li> | |
<li><a href="https://code.google.com/p/google-security-research/issues/detail?id=222" time_added="1442112306" tags="">https://code.google.com/p/google-security-research/issues/detail?id=222</a></li> | |
<li><a href="https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf" time_added="1441914240" tags="">https://securelist.com/files/2015/02/Equation_group_questions_and_answers.p</a></li> | |
<li><a href="https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/" time_added="1441913929" tags="">Flare-On Reversing Challenges 2015 – Trail of Bits Blog</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf" time_added="1441688927" tags="">https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Ma</a></li> | |
<li><a href="http://blog.quarkslab.com/usb-fuzzing-basics-from-fuzzing-to-bug-reporting.html" time_added="1441496774" tags="">USB Fuzzing Basics: From fuzzing to bug reporting</a></li> | |
<li><a href="https://www.blackhat.com/presentations/bh-usa-07/Dowd_McDonald_and_Mehta/Whitepaper/bh-usa-07-dowd_mcdonald_and_mehta.pdf" time_added="1441254031" tags="">https://www.blackhat.com/presentations/bh-usa-07/Dowd_McDonald_and_Mehta/Whitepaper/bh-usa-07-dowd_mcdonald_and_mehta.pdf</a></li> | |
<li><a href="http://udspace.udel.edu/bitstream/handle/19716/10145/Ryan_VanAntwerp_thesis.pdf?sequence=1" time_added="1441206722" tags="">udspace.udel.edu/bitstream/handle/19716/10145/Ryan_VanAntwerp_thesis.pdf?se</a></li> | |
<li><a href="https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit" time_added="1441160285" tags="">Information Security: Skynet, a Tor-powered bot... | Rapid7 Community</a></li> | |
<li><a href="http://www.cs.unm.edu/~treport/tr/02-12/zovi.pdf" time_added="1441044946" tags="">www.cs.unm.edu/~treport/tr/02-12/zovi.pdf</a></li> | |
<li><a href="http://blog.dragonsector.pl/2013/09/csaw-ctf-quals-2013-slurp-crypto-500.html" time_added="1440970690" tags="crypto,hashes">Dragon Sector: CSAW CTF Quals 2013 - slurp (crypto 500)</a></li> | |
<li><a href="http://www.scribd.com/doc/195135561/Jupiter-Collaboration-Operational-Transformation" time_added="1440719436" tags="">Jupiter Collaboration (Operational Transformation)</a></li> | |
<li><a href="http://pocket.co/sojqB3?cta=1" time_added="1440264781" tags="">http://pocket.co/sojqB3?cta=1</a></li> | |
<li><a href="http://www.nsaplayset.org/keysweeper" time_added="1440130466" tags="">KEYSWEEPER - NSA Playset</a></li> | |
<li><a href="http://www.codereversing.com/blog/archives/category/reveng" time_added="1440129498" tags="">RCE Endeavors » Reverse Engineering</a></li> | |
<li><a href="https://doar-e.github.io/blog/2015/08/18/keygenning-with-klee/" time_added="1440046497" tags="">Keygenning with KLEE - Diary of a reverse-engineer</a></li> | |
<li><a href="http://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/" time_added="1439488703" tags="">Hardware Side Channels in the Cloud – Trail of Bits Blog</a></li> | |
<li><a href="http://www.slideshare.net/torque59/exploiting-nosql-like-never-before" time_added="1439081356" tags="nosql,sql">Exploiting NoSQL Like Never Before</a></li> | |
<li><a href="https://web.archive.org/web/20140224142839/http://security.ece.cmu.edu/aeg/aeg-current.pdf" time_added="1438970949" tags="">https://web.archive.org/web/20140224142839/http://security.ece.cmu.edu/aeg/</a></li> | |
<li><a href="http://travisgoodspeed.blogspot.com/2012/07/emulating-usb-devices-with-python.html?m=1" time_added="1438901692" tags="">http://travisgoodspeed.blogspot.com/2012/07/emulating-usb-devices-with-python.html?m=1</a></li> | |
<li><a href="https://github.com/retme7/mate7_TZ_exploit/blob/master/doc/us-15-Shen-Attack-Your-Trusted-Core-wp.pdf" time_added="1438787313" tags="android">mate7_TZ_exploit/us-15-Shen-Attack-Your-Trusted-Core-wp.pdf at master · ret</a></li> | |
<li><a href="https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-798.pdf" time_added="1438547653" tags="">https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-798.pdf</a></li> | |
<li><a href="http://nelenkov.blogspot.ch/2014/10/revisiting-android-disk-encryption.html" time_added="1438547150" tags="android,encryption">Revisiting Android disk encryption</a></li> | |
<li><a href="https://theoverspill.wordpress.com/2015/07/30/the-adblocking-revolution-is-months-away-with-ios-9-with-trouble-for-advertisers-publishers-and-google/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1438444410" tags="">https://theoverspill.wordpress.com/2015/07/30/the-adblocking-revolution-is-months-away-with-ios-9-with-trouble-for-advertisers-publishers-and-google/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf" time_added="1438406249" tags="">https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf</a></li> | |
<li><a href="http://lcamtuf.coredump.cx/" time_added="1438362882" tags="">[lcamtuf.coredump.cx]</a></li> | |
<li><a href="http://www.msreverseengineering.com/blog/2015/7/30/smt-based-binary-program-analysis-course-sample-x86-assemblydisassembly" time_added="1438298831" tags="">SMT-Based Binary Program Analysis Course Sample: X86 Assembly/Disassembly —</a></li> | |
<li><a href="https://www.youtube.com/watch?v=DEDYk8zN53A" time_added="1438273065" tags="keygen">Reverse Engineering the LaFarge Crackme #2 and keygen - YouTube</a></li> | |
<li><a href="http://www.well-typed.com/blog/103/" time_added="1438185193" tags="">Well-Typed - The Haskell Consultants: Simple SMT solver for use in an optim</a></li> | |
<li><a href="https://www.cs.cmu.edu/~ecc/roku-nfp.html" time_added="1438092645" tags="">https://www.cs.cmu.edu/~ecc/roku-nfp.html</a></li> | |
<li><a href="https://www.youtube.com/watch?v=YUikShiPEg8" time_added="1437946423" tags="">Concolic Execution, Jonathan Salwan, LSE Week 2013 - YouTube</a></li> | |
<li><a href="https://jon.oberheide.org/" time_added="1437715409" tags="">jon.oberheide.org - welcome</a></li> | |
<li><a href="http://adamsblog.aperturelabs.com/" time_added="1437707368" tags="">Obviously a Major Malfunction...</a></li> | |
<li><a href="http://www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-1029" time_added="1437632834" tags="">www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-102</a></li> | |
<li><a href="http://gynvael.coldwind.pl/?blog=1" time_added="1437493086" tags="">gynvael.coldwind//vx.log</a></li> | |
<li><a href="http://ifsec.blogspot.com/2012/02/reliable-windows-7-exploitation-case.html" time_added="1437406494" tags="browser,ie">Ivan Fratric's Security Blog: Reliable Windows 7 Exploitation: A Case Study</a></li> | |
<li><a href="http://www.vupen.com/blog/20120710.Advanced_Exploitation_of_Internet_Explorer_HeapOv_CVE-2012-1876.php" time_added="1437406487" tags="exploit,ie,windows">VUPEN Vulnerability Research Blog - Advanced Exploitation of Internet Explo</a></li> | |
<li><a href="http://ifsec.blogspot.com/2013/11/exploiting-internet-explorer-11-64-bit.html" time_added="1437160693" tags="browser,ie">Ivan Fratric's Security Blog: Exploiting Internet Explorer 11 64-bit on Win</a></li> | |
<li><a href="http://www3.cs.stonybrook.edu/~mikepo/papers/devil.ndss15.pdf" time_added="1437090610" tags="browser,jit">www3.cs.stonybrook.edu/~mikepo/papers/devil.ndss15.pdf</a></li> | |
<li><a href="http://users.ece.cmu.edu/~arebert/papers/mayhem-oakland-12.pdf" time_added="1436582974" tags="automation,exploit">users.ece.cmu.edu/~arebert/papers/mayhem-oakland-12.pdf</a></li> | |
<li><a href="http://reverse.put.as/" time_added="1436578364" tags="hacking,mac">Reverse Engineering Mac OS X | Reverse Engineering and Security for fun and</a></li> | |
<li><a href="http://dslab.epfl.ch/pubs/cloud9.pdf" time_added="1436540238" tags="">dslab.epfl.ch/pubs/cloud9.pdf</a></li> | |
<li><a href="http://valgrind.org/docs/newsome2005.pdf" time_added="1436461878" tags="">valgrind.org/docs/newsome2005.pdf</a></li> | |
<li><a href="http://leafsr.com/research.html" time_added="1436410748" tags="hacking,whitepaper">Research</a></li> | |
<li><a href="https://media.blackhat.com/bh-us-12/Briefings/Rohlf/BH_US_12_Rohlf_Google_Native_Client_WP.pdf" time_added="1434323662" tags="browser,chrome,google,native client">https://media.blackhat.com/bh-us-12/Briefings/Rohlf/BH_US_12_Rohlf_Google_Native_Client_WP.pdf</a></li> | |
<li><a href="http://www.inf.fu-berlin.de/groups/ag-si/compsec_assign/Dowd2008.pdf" time_added="1434323651" tags="actionscript,dowd,exploit">http://www.inf.fu-berlin.de/groups/ag-si/compsec_assign/Dowd2008.pdf</a></li> | |
<li><a href="http://legbacore.com/Research_files/HowManyMillionBIOSesWouldYouLikeToInfect_Whitepaper_v1.pdf" time_added="1434323637" tags="bios,exploit">http://legbacore.com/Research_files/HowManyMillionBIOSesWouldYouLikeToInfect_Whitepaper_v1.pdf</a></li> | |
<li><a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" time_added="1429851521" tags="">http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/</a></li> | |
<li><a href="http://web.eecs.utk.edu/~huangj/cs360/lecture_notes.html" time_added="1429306694" tags="c,programming">CS360 -- Lecture Notes</a></li> | |
<li><a href="http://kitctf.de/writeups/insomnihack-teaser-2015/elysium/" time_added="1421779251" tags="ctf,heap">InsomniHack Teaser - elysium writeup</a></li> | |
</ul> | |
<h1>Read Archive</h1> | |
<ul> | |
<li><a href="https://americanaffairsjournal.org/2019/08/rotten-stem-how-technology-corrupts-education/" time_added="1580155132" tags="">Rotten STEM: How Technology Corrupts Education - American Affairs Journal</a></li> | |
<li><a href="https://cloudblog.withgoogle.com/products/gcp/tcp-bbr-congestion-control-comes-to-gcp-your-internet-just-got-faster/amp/" time_added="1580155128" tags="">TCP BBR congestion control comes to GCP – your Internet just got faster</a></li> | |
<li><a href="https://developers.google.com/machine-learning/guides/rules-of-ml" time_added="1577726647" tags="">Rules of Machine Learning: | ML Universal Guides | Google Developers</a></li> | |
<li><a href="http://journal.stuffwithstuff.com/2015/02/01/what-color-is-your-function/" time_added="1576809275" tags="">What Color is Your Function? – journal.stuffwithstuff.com</a></li> | |
<li><a href="https://medium.com/@morga046/creating-an-nlp-data-set-from-youtube-subtitles-fb59c0955c2" time_added="1576428397" tags="">Creating an NLP data set from YouTube subtitles. - William Morgan - Medium</a></li> | |
<li><a href="http://ai.intelligentonlinetools.com/ml/tag/search-results-clustering/" time_added="1576428369" tags="">search results clustering Archives - Text Analytics Techniques</a></li> | |
<li><a href="http://blog.interviewing.io/we-ran-the-numbers-and-there-really-is-a-pipeline-problem-in-eng-hiring/" time_added="1576428268" tags="">We ran the numbers, and there really is a pipeline problem in eng hiring. -</a></li> | |
<li><a href="https://quillette.com/2019/09/17/i-basically-just-made-it-up-confessions-of-a-social-constructionist/" time_added="1576386182" tags="">Confessions of a Social Constructionist - Quillette</a></li> | |
<li><a href="http://dataskunkworks.com/2018/06/06/extracting-topics-from-11000-newsgroups-posts-with-python-gensim-and-lda/" time_added="1576374582" tags="">Extracting topics from 11,000 Newsgroups posts with Python, Gensim and LDA </a></li> | |
<li><a href="http://inc.com/jeff-haden/10-things-incredibly-likable-people-never-ever-do-why-you-love-them-for-it.html" time_added="1575831318" tags="">http://inc.com/jeff-haden/10-things-incredibly-likable-people-never-ever-do-why-you-love-them-for-it.html</a></li> | |
<li><a href="https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit_Dev.md" time_added="1575830992" tags="">Infosec_Reference/Exploit_Dev.md at master · rmusser01/Infosec_Reference</a></li> | |
<li><a href="http://neuralnetworksanddeeplearning.com/chap1.html" time_added="1575830939" tags="">Neural networks and deep learning</a></li> | |
<li><a href="https://pielco11.ovh/posts/cloud-hunting/" time_added="1575830930" tags="">Unveiling IPs behind Cloudflare :: 0xNONEprivacy</a></li> | |
<li><a href="http://jalammar.github.io/illustrated-word2vec/" time_added="1575830905" tags="">The Illustrated Word2vec – Jay Alammar – Visualizing machine learning one c</a></li> | |
<li><a href="https://github.com/RaRe-Technologies/gensim/blob/develop/docs/notebooks/FastText_Tutorial.ipynb" time_added="1575830868" tags="">gensim/FastText_Tutorial.ipynb at develop · RaRe-Technologies/gensim · GitH</a></li> | |
<li><a href="https://radimrehurek.com/gensim/wiki.html" time_added="1575830862" tags="">gensim: Experiments on the English Wikipedia</a></li> | |
<li><a href="https://github.com/cemoody/lda2vec/blob/master/README.rst" time_added="1575829080" tags="">lda2vec/README.rst at master · cemoody/lda2vec · GitHub</a></li> | |
<li><a href="https://medium.com/containers-on-aws/scaling-a-realtime-chat-app-on-aws-using-socket-io-redis-and-aws-fargate-4ed63fb1b681" time_added="1575084040" tags="">Scaling a realtime chat app on AWS using Socket.io, Redis, and AWS Fargate</a></li> | |
<li><a href="https://tomassetti.me/best-programming-languages/" time_added="1574297214" tags="">The Best Programming Languages for each Situation</a></li> | |
<li><a href="https://blogs.dropbox.com/tech/2019/09/our-journey-to-type-checking-4-million-lines-of-python/" time_added="1574295619" tags="">Our journey to type checking 4 million lines of Python | Dropbox Tech Blog</a></li> | |
<li><a href="https://realpython.com/python-metaclasses/" time_added="1573981842" tags="">Python Metaclasses – Real Python</a></li> | |
<li><a href="https://github.com/google/sanitizers/blob/master/hwaddress-sanitizer/login_summer19_03_serebryany.pdf" time_added="1573931373" tags="">https://github.com/google/sanitizers/blob/master/hwaddress-sanitizer/login_summer19_03_serebryany.pdf</a></li> | |
<li><a href="https://towardsdatascience.com/keeping-it-classy-how-quizlet-uses-hierarchical-classification-to-label-content-with-academic-4e89a175ebe3" time_added="1572566904" tags="">Keeping It Classy: How Quizlet uses hierarchical classification to label co</a></li> | |
<li><a href="https://realpython.com/python-concurrency/" time_added="1571866736" tags="">Speed Up Your Python Program With Concurrency – Real Python</a></li> | |
<li><a href="https://snarky.ca/how-the-heck-does-async-await-work-in-python-3-5/" time_added="1571866732" tags="">How the heck does async/await work in Python 3.5?</a></li> | |
<li><a href="http://atlasobscura.com/articles/soviet-union-pepsi-ships" time_added="1568771937" tags="">http://atlasobscura.com/articles/soviet-union-pepsi-ships</a></li> | |
<li><a href="https://about.sourcegraph.com/blog/part-2-how-sourcegraph-scales-with-the-language-server-protocol" time_added="1568771924" tags="">Part 2: How Sourcegraph scales with the Language Server Protocol</a></li> | |
<li><a href="https://about.sourcegraph.com/blog/part-1-how-sourcegraph-scales-with-the-language-server-protocol" time_added="1568771421" tags="">Part 1: How Sourcegraph scales with the Language Server Protocol</a></li> | |
<li><a href="https://www.dropbox.com/s/llp24loq5odvyhk/Crown%20Sterling%20CEO%20-%20BH%2008.07.19.mov" time_added="1567135167" tags="">Crown Sterling CEO - BH 08.07.19.mov</a></li> | |
<li><a href="https://epxx.co/artigos/bluetooth_gatt.html" time_added="1567033618" tags="">Bluetooth: ATT and GATT</a></li> | |
<li><a href="https://www.twitlonger.com/show/n_1squrmi" time_added="1565919604" tags="">TwitLonger — When you talk too much for Twitter</a></li> | |
<li><a href="https://research.checkpoint.com/cryptographic-attacks-a-guide-for-the-perplexed/" time_added="1565918637" tags="">Cryptographic Attacks: A Guide for the Perplexed - Check Point Research</a></li> | |
<li><a href="https://www.ifixit.com/Guide/MacBook+Pro+15-Inch+Touch+Bar+2018+Battery+Replacement/122269" time_added="1565747024" tags="">MacBook Pro 15" Touch Bar 2018 Battery Replacement - iFixit Repair Guide</a></li> | |
<li><a href="http://www.lihaoyi.com/post/HowtoconductagoodProgrammingInterview.html" time_added="1563851914" tags="">How to conduct a good Programming Interview</a></li> | |
<li><a href="http://tasvideos.org/6347S.html" time_added="1561570902" tags="">http://tasvideos.org/6347S.html</a></li> | |
<li><a href="https://zen-black.com/eric-weinstein-topics/" time_added="1561570885" tags="">Zen Black</a></li> | |
<li><a href="https://haifengl.wordpress.com/2014/07/14/ocaml-recursion/" time_added="1561402252" tags="ocaml">OCaml: Recursion | Haifeng's Random Walk</a></li> | |
<li><a href="http://getpocket.com/explore/item/these-are-the-most-secluded-hikes-in-the-u-s" time_added="1560896424" tags="">http://getpocket.com/explore/item/these-are-the-most-secluded-hikes-in-the-u-s</a></li> | |
<li><a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/" time_added="1559733054" tags="">https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/</a></li> | |
<li><a href="https://ocaml.org/learn/tutorials/99problems.html" time_added="1559733051" tags="ocaml">99 problems – OCaml</a></li> | |
<li><a href="https://www.tarlogic.com/en/blog/how-to-attack-kerberos/" time_added="1559732946" tags="">https://www.tarlogic.com/en/blog/how-to-attack-kerberos/</a></li> | |
<li><a href="https://towardsdatascience.com/what-is-tail-recursion-elimination-or-why-functional-programming-can-be-awesome-43091d76915e" time_added="1559591330" tags="">How Functional Programming can be Awesome: Tail Recursion Elimination</a></li> | |
<li><a href="https://www.heritage.org/gender/commentary/sex-reassignment-doesnt-work-here-the-evidence" time_added="1557699308" tags="">https://www.heritage.org/gender/commentary/sex-reassignment-doesnt-work-here-the-evidence</a></li> | |
<li><a href="https://kristerw.blogspot.com/2019/04/how-llvm-optimizes-geometric-sums.html" time_added="1557698048" tags="">https://kristerw.blogspot.com/2019/04/how-llvm-optimizes-geometric-sums.html</a></li> | |
<li><a href="http://kcsrk.info/multicore/gc/2017/07/06/multicore-ocaml-gc/" time_added="1557681075" tags="garbage-collection,ocaml">A deep dive into Multicore OCaml garbage collector · KC Sivaramakrishnan</a></li> | |
<li><a href="https://pthree.org/2016/06/19/the-physics-of-brute-force" time_added="1557556963" tags="">Aaron Toponce : The Physics of Brute Force</a></li> | |
<li><a href="https://getpocket.com/explore/item/religion-for-the-nonreligious" time_added="1557556960" tags="">https://getpocket.com/explore/item/religion-for-the-nonreligious</a></li> | |
<li><a href="https://www.waitbutwhy.com/2013/11/how-to-beat-procrastination.html" time_added="1557556955" tags="">https://www.waitbutwhy.com/2013/11/how-to-beat-procrastination.html</a></li> | |
<li><a href="https://waitbutwhy.com/2014/06/taming-mammoth-let-peoples-opinions-run-life.html" time_added="1557556953" tags="">https://waitbutwhy.com/2014/06/taming-mammoth-let-peoples-opinions-run-life.html</a></li> | |
<li><a href="https://waitbutwhy.com/2013/11/life-is-picture-but-you-live-in-pixel.html" time_added="1557556949" tags="">https://waitbutwhy.com/2013/11/life-is-picture-but-you-live-in-pixel.html</a></li> | |
<li><a href="https://www.huffpost.com/highline/article/capitalist-takeover-college/" time_added="1557556933" tags="">https://www.huffpost.com/highline/article/capitalist-takeover-college/</a></li> | |
<li><a href="http://phrack.org/papers/viewer_discretion_advised.html" time_added="1557420815" tags="exploit">.:: Phrack Magazine ::.</a></li> | |
<li><a href="https://blog.rekawek.eu/2017/02/09/coffee-gb/" time_added="1556316439" tags="gameboy">Why did I spend 1.5 months creating a Gameboy emulator? · tomek's blog</a></li> | |
<li><a href="https://geosn0w.github.io/A-Long-Evening-With-macOS's-Sandbox/" time_added="1555294854" tags="">A long evening with iOS and macOS Sandbox – GeoSn0w – Programmer. Hacking s</a></li> | |
<li><a href="https://blog.golang.org/errors-are-values" time_added="1555294033" tags="">Errors are values - The Go Blog</a></li> | |
<li><a href="https://medium.com/@jon.gabilondo.angulo_7635/understanding-usbmux-and-the-ios-lockdown-service-7f2a1dfd07ae" time_added="1555293259" tags="ios">Understanding usbmux and the iOS lockdown service – Jon Gabilondo – Medium</a></li> | |
<li><a href="https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html" time_added="1555283228" tags="apple,pac">Project Zero: Examining Pointer Authentication on the iPhone XS</a></li> | |
<li><a href="http://insanecoding.blogspot.com/2014/05/a-good-idea-with-bad-usage-devurandom.html" time_added="1554756320" tags="linux,random">Insane Coding: A good idea with bad usage: /dev/urandom</a></li> | |
<li><a href="https://kov4l3nko.github.io/blog/2016-04-27-debugging-ios-binaries-with-lldb/#removing-aslr" time_added="1549311999" tags="">Debugging iOS binaries with LLDB - @kov4l3nko</a></li> | |
<li><a href="https://www.theatlantic.com/science/archive/2019/01/far-side-moon-china/579349/" time_added="1547796141" tags="">https://www.theatlantic.com/science/archive/2019/01/far-side-moon-china/579349/</a></li> | |
<li><a href="https://dangokyo.me/2018/01/16/extra-heap-exploitation-tcache-and-potential-exploitation/" time_added="1543794760" tags="">Extra Heap Exploitation 2: TCache and Potential Exploitation | 氷 菓</a></li> | |
<li><a href="https://blog.quarkslab.com/modern-jailbreaks-post-exploitation.html" time_added="1543026069" tags="">Modern Jailbreaks' Post-Exploitation</a></li> | |
<li><a href="https://medium.com/hi-my-name-is-jon/how-to-invest-in-yourself-a98dfd33e81a" time_added="1538431712" tags="">How To Invest In Yourself.</a></li> | |
<li><a href="https://medium.com/time-dorks/how-i-became-a-morning-person-and-why-i-decided-to-make-the-change-eb1b012a16e5" time_added="1538431558" tags="">How I became a morning person (and why I decided to make the change)</a></li> | |
<li><a href="https://www.fs.blog/2018/04/inertia/" time_added="1538430818" tags="">https://www.fs.blog/2018/04/inertia/</a></li> | |
<li><a href="https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md" time_added="1538011142" tags="">owasp-mstg/0x05b-Reverse-Engineering-and-Tampering-Android.md at master · O</a></li> | |
<li><a href="https://medium.com/m/global-identity?redirectUrl=https://theringer.com/uber-lyft-return-to-austin-14ddfce7152" time_added="1538011124" tags="">https://medium.com/m/global-identity?redirectUrl=https://theringer.com/uber-lyft-return-to-austin-14ddfce7152</a></li> | |
<li><a href="https://www.theguardian.com/society/2018/apr/29/millennials-struggling-is-it-fault-of-baby-boomers-intergenerational-fairness" time_added="1538011059" tags="">https://www.theguardian.com/society/2018/apr/29/millennials-struggling-is-it-fault-of-baby-boomers-intergenerational-fairness</a></li> | |
<li><a href="http://www.businessinsider.com/jeff-bezo-advice-to-amazon-employees-dont-aim-for-work-life-balance-its-a-circle-2018-4" time_added="1538009587" tags="">http://www.businessinsider.com/jeff-bezo-advice-to-amazon-employees-dont-aim-for-work-life-balance-its-a-circle-2018-4</a></li> | |
<li><a href="http://www.phrack.org/papers/attacking_javascript_engines.html" time_added="1537670922" tags="exploit">.:: Phrack Magazine ::.</a></li> | |
<li><a href="https://www.theatlantic.com/education/archive/2018/04/early-childhood-outdoor-education/558959/" time_added="1537590342" tags="">https://www.theatlantic.com/education/archive/2018/04/early-childhood-outdoor-education/558959/</a></li> | |
<li><a href="http://www.breitbart.com/big-government/2015/09/21/heres-why-the-progressive-left-keeps-sticking-up-for-pedophiles/" time_added="1537590199" tags="">Why The Progressive Left Keeps Sticking Up For Pedophiles</a></li> | |
<li><a href="https://philwantsfish.github.io/security/java-deserialization-github" time_added="1537589867" tags="">philwantsfish</a></li> | |
<li><a href="https://blog.quarkslab.com/introduction-to-trusted-execution-environment-arms-trustzone.html" time_added="1537589840" tags="">Introduction to Trusted Execution Environment: ARM's TrustZone</a></li> | |
<li><a href="https://github.com/trailofbits/binjascripts/blob/master/find_heartbleed/find_heartbleed.py" time_added="1537589835" tags="">binjascripts/find_heartbleed.py at master · trailofbits/binjascripts</a></li> | |
<li><a href="http://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting" time_added="1533522060" tags="">http://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting</a></li> | |
<li><a href="https://www.fs.blog/general-thinking-tools/" time_added="1529106018" tags="">https://www.fs.blog/general-thinking-tools/</a></li> | |
<li><a href="https://www.theatlantic.com/health/archive/2011/10/all-work-and-no-play-why-your-kids-are-more-anxious-depressed/246422/?single_page=true" time_added="1526757278" tags="">All Work and No Play: Why Your Kids Are More Anxious, Depressed - The Atlan</a></li> | |
<li><a href="https://theoutline.com/post/4269/k-pop-propaganda-south-korea-north-korea-demilitarized-zone" time_added="1526000542" tags="">https://theoutline.com/post/4269/k-pop-propaganda-south-korea-north-korea-demilitarized-zone</a></li> | |
<li><a href="https://www.theguardian.com/commentisfree/2018/apr/29/revolution-in-our-understaning-of-depression-will-be-life-transforming" time_added="1525977087" tags="">https://www.theguardian.com/commentisfree/2018/apr/29/revolution-in-our-understaning-of-depression-will-be-life-transforming</a></li> | |
<li><a href="https://www.nytimes.com/2018/05/06/opinion/trump-supporters-economy-racism.html" time_added="1525826422" tags="">https://www.nytimes.com/2018/05/06/opinion/trump-supporters-economy-racism.html</a></li> | |
<li><a href="https://www.kennethreitz.org/essays/the-reality-of-developer-burnout" time_added="1524701612" tags="">The Reality of Developer Burnout — Kenneth Reitz</a></li> | |
<li><a href="http://mksben.l0.cm/2015/10/css-based-attack-abusing-unicode-range.html?m=1" time_added="1521522595" tags="">http://mksben.l0.cm/2015/10/css-based-attack-abusing-unicode-range.html?m=1</a></li> | |
<li><a href="http://nautil.us/issue/32/space/the-deep-space-of-digital-reading?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1521522404" tags="">Do You Read Differently Online and in Print?</a></li> | |
<li><a href="https://getpocket.com/s/Mpi_E" time_added="1521521163" tags="">https://getpocket.com/s/Mpi_E</a></li> | |
<li><a href="https://www.cs.uic.edu/~s/musings/equation-group/" time_added="1521521100" tags="">https://www.cs.uic.edu/~s/musings/equation-group/</a></li> | |
<li><a href="https://www.cs.uic.edu/~s/musings/equation-group-rc6/" time_added="1521521092" tags="">https://www.cs.uic.edu/~s/musings/equation-group-rc6/</a></li> | |
<li><a href="https://access.redhat.com/blogs/766093/posts/2592591" time_added="1521521050" tags="">A bite of Python - Red Hat Customer Portal</a></li> | |
<li><a href="http://willdrevo.com/fingerprinting-and-audio-recognition-with-python/" time_added="1521520944" tags="">Audio Fingerprinting with Python and Numpy · Will Drevo</a></li> | |
<li><a href="http://www.bakadesuyo.com/2016/10/how-to-resist-distraction/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1521520901" tags="">http://www.bakadesuyo.com/2016/10/how-to-resist-distraction/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://www.catb.org/~esr/faqs/smart-questions.html" time_added="1521520388" tags="">How To Ask Questions The Smart Way</a></li> | |
<li><a href="https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/" time_added="1521520321" tags="">https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/</a></li> | |
<li><a href="http://blog.talosintel.com/2016/11/crashing-stacks-without-squishing-bugs.html" time_added="1521517517" tags="">Cisco Talos Blog: Crashing Stacks Without Squishing Bugs: Advanced Vulnerab</a></li> | |
<li><a href="https://eev.ee/blog/2016/12/01/lets-stop-copying-c/" time_added="1521517434" tags="">https://eev.ee/blog/2016/12/01/lets-stop-copying-c/</a></li> | |
<li><a href="http://www.openculture.com/2017/04/the-tone-circle-john-coltrane-drew-to-illustrate-the-theory-behind-his-most-famous-compositions-1967.html?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1521515501" tags="">http://www.openculture.com/2017/04/the-tone-circle-john-coltrane-drew-to-illustrate-the-theory-behind-his-most-famous-compositions-1967.html?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/" time_added="1521515460" tags="">https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/</a></li> | |
<li><a href="https://thewalrus.ca/the-benefits-of-solitude/" time_added="1521515443" tags="">https://thewalrus.ca/the-benefits-of-solitude/</a></li> | |
<li><a href="https://www.nowsecure.com/blog/2013/10/03/ebay-for-android-content-provider-injection-vulnerability/" time_added="1520784118" tags="">eBay for Android Content Provider Injection Vulnerability - NowSecure</a></li> | |
<li><a href="https://www.ubercomp.com/posts/2014-01-16_facebook_remote_code_execution" time_added="1520784015" tags="">How I found a Remote Code Execution bug affecting Facebook's servers</a></li> | |
<li><a href="https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md" time_added="1520715015" tags="">https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md</a></li> | |
<li><a href="http://senthilthecoder.com/post/avr-toolchain-update-section/" time_added="1520714909" tags="">Making use of objcopy's --update-section for fun and profit | Senthil Kumar</a></li> | |
<li><a href="https://bugbountyforum.com/tools/exploitation-scanning/" time_added="1520714884" tags="">https://bugbountyforum.com/tools/exploitation-scanning/</a></li> | |
<li><a href="https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html" time_added="1520714879" tags="">FLARE Script Series: Automating Obfuscated String Decoding « Threat Researc</a></li> | |
<li><a href="http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/" time_added="1520714793" tags="">Rails Webconsole DNS Rebinding - Ben's Blog</a></li> | |
<li><a href="http://ourmachinery.com/post/virtual-memory-tricks/" time_added="1520712786" tags="">Virtual Memory Tricks · Our Machinery</a></li> | |
<li><a href="https://chromium.googlesource.com/chromium/src/+/lkgr/headless/README.md" time_added="1508254144" tags="">Headless Chromium</a></li> | |
<li><a href="https://paper.dropbox.com/doc/Sample-Brainstormd-zxdKyzHTKXndsj3r3uMPO#:uid=025897754212354422584959&h2=Levels-/-Stages" time_added="1508253993" tags="">Sample: Brainstormd – Dropbox Paper</a></li> | |
<li><a href="https://github.com/mseclab/nathan" time_added="1507912914" tags="">https://github.com/mseclab/nathan</a></li> | |
<li><a href="http://blog.timac.org/?p=1570" time_added="1507912560" tags="">Timac » Blog Archive » Deobfuscating libMobileGestalt keys</a></li> | |
<li><a href="https://lolware.net/2015/04/28/nginx-fuzzing.html" time_added="1507912548" tags="">Fuzzing nginx - Hunting vulnerabilities with afl-fuzz</a></li> | |
<li><a href="https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html" time_added="1507912479" tags="">https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html</a></li> | |
<li><a href="https://www.bishopfox.com/blog/2015/05/rethinking-repackaging-ios-apps-part-2/" time_added="1507910801" tags="">Rethinking & Repackaging iOS Apps: Part 2 - Bishop Fox</a></li> | |
<li><a href="https://www.bishopfox.com/blog/2015/02/rethinking-repackaging-ios-apps-part-1/" time_added="1507910776" tags="">Rethinking & Repackaging iOS Apps: Part 1 - Bishop Fox</a></li> | |
<li><a href="https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/" time_added="1506731010" tags="">Android Applications Reversing 101 | Simone Margaritelli</a></li> | |
<li><a href="https://www.theverge.com/2017/4/24/15403644/microdosing-lsd-acid-productivity-benefits-brain-studies" time_added="1506731005" tags="">https://www.theverge.com/2017/4/24/15403644/microdosing-lsd-acid-productivity-benefits-brain-studies</a></li> | |
<li><a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide/blob/master/README.md#dnsmasq" time_added="1506730996" tags="">https://github.com/drduh/macOS-Security-and-Privacy-Guide/blob/master/README.md#dnsmasq</a></li> | |
<li><a href="http://michenriksen.com/blog/aquatone-tool-for-domain-flyovers/" time_added="1506730306" tags="">http://michenriksen.com/blog/aquatone-tool-for-domain-flyovers/</a></li> | |
<li><a href="http://www.newyorker.com/tech/elements/zoe-quinns-depression-quest" time_added="1504231694" tags="">Zoe Quinn’s Depression Quest | The New Yorker</a></li> | |
<li><a href="https://qz.com/806516/the-secret-to-patagonias-success-keeping-moms-and-onsite-child-care-and-paid-parental-leave/" time_added="1503341029" tags="">The secret to Patagonia’s success? Keeping moms and onsite child care and p</a></li> | |
<li><a href="https://joeshaw.org/dont-defer-close-on-writable-files/" time_added="1498522925" tags="">Don’t defer Close() on writable files – joe shaw</a></li> | |
<li><a href="https://pocket.co/xMCypw?cta=1&src=ph" time_added="1495655478" tags="">https://pocket.co/xMCypw?cta=1&src=ph</a></li> | |
<li><a href="https://pocket.co/xMCyhn?cta=1&src=ph" time_added="1495655424" tags="">https://pocket.co/xMCyhn?cta=1&src=ph</a></li> | |
<li><a href="https://pocket.co/xMCypa?cta=1&src=ph" time_added="1495654154" tags="">https://pocket.co/xMCypa?cta=1&src=ph</a></li> | |
<li><a href="http://www.vox.com/2016/4/28/11518804/weight-loss-exercise-myth-burn-calories" time_added="1492804343" tags="">Why you shouldn't exercise to lose weight, explained with 60 studies - Vox</a></li> | |
<li><a href="https://blog.zsec.uk/pwning-pornhub/" time_added="1490129179" tags="bug bounty">Penetrating Pays: The Pornhub Story</a></li> | |
<li><a href="https://5haked.blogspot.com/2016/10/how-i-hacked-pornhub-for-fun-and-profit.html" time_added="1490129146" tags="bug bounty">5haked's research blog: How I hacked Pornhub for fun and profit - 10,000$</a></li> | |
<li><a href="https://newcircle.com/s/post/1292/jni_reference_example" time_added="1490072205" tags="">JNI Reference Example - NewCircle Training</a></li> | |
<li><a href="https://marcograss.github.io/security/apple/xpc/2016/06/17/containermanagerd-xpc-array-oob.html" time_added="1489628619" tags="">[CVE-2016-????] iOS containermanagerd XPC array out of bound vulnerability</a></li> | |
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2009-01-16.html" time_added="1489628607" tags="">mikeash.com: Friday Q&A 2009-01-16</a></li> | |
<li><a href="http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html?m=1" time_added="1489628554" tags="">http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html?m=1</a></li> | |
<li><a href="http://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things" time_added="1489628430" tags="">How to Build a Safer Internet of Things - IEEE Spectrum</a></li> | |
<li><a href="https://securitycafe.ro/2017/01/18/practical-jsonp-injection/" time_added="1489628333" tags="">Practical JSONP Injection – Security Café</a></li> | |
<li><a href="http://www.npr.org/sections/health-shots/2017/01/16/509353565/when-the-brain-scrambles-names-its-because-you-love-them?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1485532245" tags="">http://www.npr.org/sections/health-shots/2017/01/16/509353565/when-the-brain-scrambles-names-its-because-you-love-them?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://motherboard.vice.com/read/phineas-fisher-sme?utm_source=mbtwitter" time_added="1477805222" tags="">http://motherboard.vice.com/read/phineas-fisher-sme?utm_source=mbtwitter</a></li> | |
<li><a href="https://blog.skullsecurity.org/2015/how-i-nearly-almost-saved-the-internet-starring-afl-fuzz-and-dnsmasq" time_added="1477521982" tags="fuzzing">How I nearly almost saved the Internet, starring afl-fuzz and dnsmasq » Sku</a></li> | |
<li><a href="https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf" time_added="1477088761" tags="">DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool</a></li> | |
<li><a href="http://free-electrons.com/doc/network-drivers-lab.pdf" time_added="1476768899" tags="driver,linux">Linux network driver development - Lab book</a></li> | |
<li><a href="https://rstforums.com/forum/topic/101533-bypassing-chromes-xss-auditor/" time_added="1476768609" tags="">Bypassing Chromes XSS Auditor - Tutoriale in engleza - Romanian Security Te</a></li> | |
<li><a href="http://find-sec-bugs.github.io/bugs.htm#XSS_JSP_PRINT" time_added="1476768304" tags="java,xss">Bug Patterns - Find Security Bugs</a></li> | |
<li><a href="https://css-tricks.com/snippets/css/a-guide-to-flexbox/" time_added="1476768266" tags="css,web">A Complete Guide to Flexbox | CSS-Tricks</a></li> | |
<li><a href="http://struct.github.io/pdfium_partitionalloc.html" time_added="1476767795" tags="">Root Cause</a></li> | |
<li><a href="https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet" time_added="1476767306" tags="">How to Crash Systemd in One Tweet</a></li> | |
<li><a href="https://blog.zsec.uk/gif-time-pornhub/" time_added="1476492103" tags="bug bounty">gif it time it'll come to you - Finding More Holes in The Hub</a></li> | |
<li><a href="https://xorl.wordpress.com/2010/10/14/linux-glibc-stack-canary-values/" time_added="1476229308" tags="">Linux GLibC Stack Canary Values | xorl ?x, </a></li> | |
<li><a href="http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/" time_added="1476229300" tags="it,opsec,sysadmin">My First 10 Minutes On a Server - Primer for Securing Ubuntu</a></li> | |
<li><a href="https://labs.signalsciences.com/hacking-the-hard-way-at-the-derbycon-ctf-d35b4dd4c97d#.mvqxu0s18" time_added="1476229129" tags="">Hacking the Hard Way at the DerbyCon CTF</a></li> | |
<li><a href="https://backtrace.io/blog/blog/2016/04/22/elf-shared-library-injection-forensics/" time_added="1475376678" tags="">ELF Shared Library Injection Forensics - Backtrace I/O</a></li> | |
<li><a href="https://github.com/drduh/OS-X-Security-and-Privacy-Guide" time_added="1475376340" tags="">GitHub - drduh/OS-X-Security-and-Privacy-Guide: A practical guide to securi</a></li> | |
<li><a href="http://www.scientificamerican.com/article/how-to-raise-a-genius-lessons-from-a-45-year-study-of-supersmart-children/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1474765288" tags="">How to Raise a Genius: Lessons from a 45-Year Study of Supersmart Children </a></li> | |
<li><a href="http://www.newyorker.com/books/page-turner/the-book-that-taught-me-what-i-want-to-teach-my-daughter?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1474765234" tags="">The Book That Taught Me What I Want to Teach My Daughter - The New Yorker</a></li> | |
<li><a href="http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" time_added="1474387274" tags="exploit">MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html</a></li> | |
<li><a href="https://randomascii.wordpress.com/2016/09/16/everything-old-is-new-again-and-a-compiler-bug/" time_added="1474386857" tags="">https://randomascii.wordpress.com/2016/09/16/everything-old-is-new-again-and-a-compiler-bug/</a></li> | |
<li><a href="https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/" time_added="1473473946" tags="">How I Hacked an Android App to Get Free Beer</a></li> | |
<li><a href="https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/" time_added="1473473814" tags="">The Million Dollar Dissident: NSO Group's iPhone Zero-Days used against a U</a></li> | |
<li><a href="http://shiflett.org/blog/2006/jan/addslashes-versus-mysql-real-escape-string" time_added="1473473569" tags="sql injection,web">addslashes() Versus mysql_real_escape_string(), by Chris Shiflett</a></li> | |
<li><a href="https://room362.com/post/2016/snagging-creds-from-locked-machines/" time_added="1473473452" tags="">Snagging creds from locked machines · Room362</a></li> | |
<li><a href="http://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html" time_added="1473171195" tags="exploit,ios">PEGASUS iOS Kernel Vulnerability Explained | SektionEins GmbH</a></li> | |
<li><a href="https://sanctum.geek.nz/arabesque/actually-using-ed/" time_added="1471805269" tags="ed,exploit">Actually using ed | Arabesque</a></li> | |
<li><a href="https://www.polidea.com/blog/Protecting_iOS_Applications/" time_added="1468549139" tags="antireversing,ios">Protecting iOS Applications | Polidea</a></li> | |
<li><a href="https://c0nradsc0rner.wordpress.com/2016/06/17/xss-persistence-using-jsonp-and-serviceworkers" time_added="1468549033" tags="web,xss">https://c0nradsc0rner.wordpress.com/2016/06/17/xss-persistence-using-jsonp-and-serviceworkers</a></li> | |
<li><a href="https://blog.skullsecurity.org/2012/using-git-clone-to-get-pwn3d" time_added="1465925347" tags="">https://blog.skullsecurity.org/2012/using-git-clone-to-get-pwn3d</a></li> | |
<li><a href="http://drewspewsmuse.blogspot.de/2016/06/how-i-hacked-self-balancing-scooter.html?m=1" time_added="1465925224" tags="">http://drewspewsmuse.blogspot.de/2016/06/how-i-hacked-self-balancing-scooter.html?m=1</a></li> | |
<li><a href="http://pastebin.com/LhG6dJQv" time_added="1465925220" tags="">http://pastebin.com/LhG6dJQv</a></li> | |
<li><a href="http://arsiadi.net/2016/06/11/stories-of-xss-in-google-april-may-2016/" time_added="1465840933" tags="">http://arsiadi.net/2016/06/11/stories-of-xss-in-google-april-may-2016/</a></li> | |
<li><a href="http://bini.tech/google-stored-xss-es/" time_added="1465840871" tags="">http://bini.tech/google-stored-xss-es/</a></li> | |
<li><a href="https://blog.asdizzle.com/index.php/2016/04/22/ssrf-to-xss-to-csrf-to-rce-why-xss-is-dangerous/" time_added="1465840649" tags="web,xss">https://blog.asdizzle.com/index.php/2016/04/22/ssrf-to-xss-to-csrf-to-rce-why-xss-is-dangerous/</a></li> | |
<li><a href="https://developer.salesforce.com/page/Secure_Coding_Cross_Site_Scripting" time_added="1465687535" tags="web,xss">Secure Coding Cross Site Scripting - developer.force.com</a></li> | |
<li><a href="http://sijmen.ruwhof.net/weblog/937-how-i-found-a-huge-data-leak-of-a-company-during-a-college-lecture" time_added="1463500292" tags="">How I found a huge data leak of a company during a college lecture | Weblog</a></li> | |
<li><a href="http://paradoxcoffeeshop.com/" time_added="1463499860" tags="">Paradox</a></li> | |
<li><a href="http://nickcraver.com/blog/2016/02/17/stack-overflow-the-architecture-2016-edition/" time_added="1462033303" tags="">Nick Craver - Stack Overflow: The Architecture - 2016 Edition</a></li> | |
<li><a href="http://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/" time_added="1461626131" tags="">http://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</a></li> | |
<li><a href="http://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html?m=1" time_added="1461626120" tags="">http://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html?m=1</a></li> | |
<li><a href="https://github.com/mewrev/dissection" time_added="1461626100" tags="">mewrev/dissection: The dissection of a simple "hello world" ELF file.</a></li> | |
<li><a href="http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/" time_added="1461599412" tags="">How I Hacked Facebook, and Found Someone's Backdoor Script | DEVCORE 戴夫寇爾</a></li> | |
<li><a href="https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/" time_added="1461205133" tags="">https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/</a></li> | |
<li><a href="http://big-daddy.fr/repository/Documentation/Hacking/Security/Malware/Rootkits/injection-via-dev-mem.pdf" time_added="1460556680" tags="">big-daddy.fr/repository/Documentation/Hacking/Security/Malware/Rootkits/inj</a></li> | |
<li><a href="http://0x36.blogspot.com/2014/06/sigreturn-rop-exploitation-technique.html" time_added="1460556404" tags="">simo36's Blog: Sigreturn ROP exploitation technique (signal's stack frame f</a></li> | |
<li><a href="http://danmcinerney.org/reliable-dns-spoofing-with-python-scapy-nfqueue/" time_added="1460556302" tags="">Reliable DNS spoofing with Python: Scapy Nfqueue pt. 1 | Dan McInerney</a></li> | |
<li><a href="https://guidovranken.wordpress.com/" time_added="1460556292" tags="">https://guidovranken.wordpress.com/</a></li> | |
<li><a href="http://blogs.technet.com/b/srd/archive/2016/01/12/triaging-the-exploitability-of-ie-edge-crashes.aspx" time_added="1460556153" tags="">http://blogs.technet.com/b/srd/archive/2016/01/12/triaging-the-exploitability-of-ie-edge-crashes.aspx</a></li> | |
<li><a href="http://www.miasm.re/blog/2016/01/27/re150.html" time_added="1460556121" tags="">http://www.miasm.re/blog/2016/01/27/re150.html</a></li> | |
<li><a href="http://www.davidlitchfield.com/ExploitingtheOracleWorkspaceManagerSQLRaceCondition.pdf" time_added="1460332788" tags="">http://www.davidlitchfield.com/ExploitingtheOracleWorkspaceManagerSQLRaceCondition.pdf</a></li> | |
<li><a href="http://travisdazell.blogspot.com/2012/11/many-time-pad-attack-crib-drag.html" time_added="1460332725" tags="">Travis Dazell: Many Time Pad Attack - Crib Drag</a></li> | |
<li><a href="http://pythonsweetness.tumblr.com/post/64740079543/how-to-lose-172222-a-second-for-45-minutes" time_added="1460332575" tags="">http://pythonsweetness.tumblr.com/post/64740079543/how-to-lose-172222-a-second-for-45-minutes</a></li> | |
<li><a href="http://www.mathyvanhoef.com/2013/02/understanding-heap-exploiting-heap.html" time_added="1459970630" tags="">Mathy Vanhoef: Understanding the Heap & Exploiting Heap Overflows</a></li> | |
<li><a href="https://github.com/ctfs/write-ups-2014/blob/a0c08f898261cd1bd2deeaf03df892d7001b594d/asis-ctf-finals-2014/numdroid/README.md" time_added="1459885084" tags="android,ctf">write-ups-2014/README.md at a0c08f898261cd1bd2deeaf03df892d7001b594d · ctfs</a></li> | |
<li><a href="http://cturt.github.io/DS-exploit-finding.html" time_added="1459316316" tags="">http://cturt.github.io/DS-exploit-finding.html</a></li> | |
<li><a href="https://hbr.org/2015/07/create-a-conversation-not-a-presentation?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1459051066" tags="">https://hbr.org/2015/07/create-a-conversation-not-a-presentation?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://blog.exodusintel.com/2013/11/26/browser-weakest-byte/#Crashing" time_added="1459018041" tags="exploit,ie">A browser is only as strong as its weakest byte | Exodus Intelligence</a></li> | |
<li><a href="http://www.theguardian.com/technology/2016/jan/28/death-of-a-troll?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1459017979" tags="">Death of a troll | Alina Simone | Technology | The Guardian</a></li> | |
<li><a href="http://www.contrib.andrew.cmu.edu/~somlo/OSXKVM/" time_added="1458967490" tags="">Running Mac OS X as a QEMU/KVM Guest</a></li> | |
<li><a href="http://fumalwareanalysis.blogspot.in/p/malware-analysis-tutorials-reverse.html" time_added="1458966039" tags="">http://fumalwareanalysis.blogspot.in/p/malware-analysis-tutorials-reverse.html</a></li> | |
<li><a href="http://vxheaven.org/lib/vsc01.html" time_added="1458936254" tags="">Silvio Cesare 'Unix ELF parasites and virus' (VX heaven)</a></li> | |
<li><a href="https://reverse.put.as/2016/01/22/reversing-apples-syslogd-bug/" time_added="1457627696" tags="">https://reverse.put.as/2016/01/22/reversing-apples-syslogd-bug/</a></li> | |
<li><a href="https://xairy.github.io/blog/2016/cve-2016-2384" time_added="1457314157" tags="">https://xairy.github.io/blog/2016/cve-2016-2384</a></li> | |
<li><a href="http://www.thespanner.co.uk/2013/05/16/dom-clobbering/" time_added="1457099993" tags="">DOM Clobbering</a></li> | |
<li><a href="http://pocket.co/soC6gF?cta=1" time_added="1456726746" tags="">http://pocket.co/soC6gF?cta=1</a></li> | |
<li><a href="https://samples.ffmpeg.org/image-samples/" time_added="1456595353" tags="">Index of /image-samples</a></li> | |
<li><a href="https://docs.google.com/document/d/1I_-ZKo___AaI5kkE1LVmmWNNEFYzBRNdochKv9R6_lM/edit" time_added="1456594891" tags="">Intro to Newsgroups - Google Docs</a></li> | |
<li><a href="http://pocket.co/soC6ld?cta=1" time_added="1456370756" tags="">http://pocket.co/soC6ld?cta=1</a></li> | |
<li><a href="https://wiki.python.org/moin/Powerful%20Python%20One-Liners" time_added="1456121061" tags="">Powerful Python One-Liners - Python Wiki</a></li> | |
<li><a href="https://www.fireeye.com/blog/threat-research/2015/01/flare_ida_pro_script.html" time_added="1456108883" tags="">FLARE IDA Pro Script Series: Generating FLAIR function patterns using IDAPy</a></li> | |
<li><a href="http://travisgoodspeed.blogspot.com/2012/10/emulating-usb-dfu-to-capture-firmware.html" time_added="1456108872" tags="">Travis Goodspeed's Blog: Emulating USB DFU to Capture Firmware</a></li> | |
<li><a href="https://jon.oberheide.org/files/half-nelson.c" time_added="1456108464" tags="">https://jon.oberheide.org/files/half-nelson.c</a></li> | |
<li><a href="http://www.kaizendo.fr/php-how-to-manage-uploaded-image-in-secure-way/" time_added="1456103173" tags="">[php] How to manage uploaded images in secure way | Kaizendo.fr</a></li> | |
<li><a href="https://cyseclabs.com/page?n=17012016" time_added="1456087781" tags="">https://cyseclabs.com/page?n=17012016</a></li> | |
<li><a href="https://github.com/gdbinit/mpress_dumper" time_added="1456027519" tags="">gdbinit/mpress_dumper</a></li> | |
<li><a href="https://blogs.oracle.com/dns/entry/understanding_the_authorization_framework_on" time_added="1456027508" tags="">Using task_for_pid on Mac OS X (Doug's Note System)</a></li> | |
<li><a href="https://github.com/GNOME/evince/tree/master/backend/djvu" time_added="1456027469" tags="">evince/backend/djvu at master · GNOME/evince</a></li> | |
<li><a href="http://www.codereversing.com/blog/archives/282" time_added="1456027459" tags="">RCE Endeavors » Runtime DirectX Hooking</a></li> | |
<li><a href="http://nautil.us/issue/32/space/how-to-survive-solitary-confinement?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1455502843" tags="">How Would You Do in Supermax? The Answer May Lie with Imagination and Grit</a></li> | |
<li><a href="http://web.textfiles.com/ezines/ZF0/" time_added="1455286239" tags="">T E X T F I L E S</a></li> | |
<li><a href="https://avicoder.me/2016/02/01/smashsatck-revived/" time_added="1455286233" tags="">https://avicoder.me/2016/02/01/smashsatck-revived/</a></li> | |
<li><a href="https://github.com/gdbinit/onyx-the-black-cat" time_added="1454901578" tags="">gdbinit/onyx-the-black-cat: Kernel extension to disable anti-debug tricks a</a></li> | |
<li><a href="http://www.newyorker.com/culture/cultural-comment/everyone-hates-martin-shkreli-everyone-is-missing-the-point?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1454865782" tags="">Everyone Hates Martin Shkreli. Everyone Is Missing the Point - The New York</a></li> | |
<li><a href="https://matt.sh/howto-c" time_added="1454865078" tags="">How to C (as of 2016)</a></li> | |
<li><a href="https://memset.wordpress.com/2010/12/03/syscall-hijacking-kernel-2-6-systems/" time_added="1453423851" tags="">Syscall Hijacking: Kernel 2.6.* systems | memset's blog</a></li> | |
<li><a href="http://c.learncodethehardway.org/book/ex20.html" time_added="1453423820" tags="c,programming">Learn C The Hard Way</a></li> | |
<li><a href="http://fluxius.handgrep.se/2011/10/20/the-art-of-elf-analysises-and-exploitations/" time_added="1453226338" tags="elf,format">The Art Of ELF: Analysis and Exploitations | FlUxIuS' Blog</a></li> | |
<li><a href="http://ha.ckers.org/blog/category/random-security/" time_added="1451099363" tags="">http://ha.ckers.org/blog/category/random-security/</a></li> | |
<li><a href="http://blog.scrt.ch/2015/03/27/insomnihack-finals-insomnidroid-level-1-writeup/" time_added="1451098552" tags="">Insomni’hack finals – InsomniDroid Level 1 Writeup | SCRT Sec Team blog</a></li> | |
<li><a href="http://www.raywenderlich.com/90488/calayer-in-ios-with-swift-10-examples" time_added="1451098523" tags="">http://www.raywenderlich.com/90488/calayer-in-ios-with-swift-10-examples</a></li> | |
<li><a href="https://forum.reverse4you.org/showthread.php?t=2258" time_added="1451098313" tags="">https://forum.reverse4you.org/showthread.php?t=2258</a></li> | |
<li><a href="http://poppopret.org/2013/12/18/reverse-engineering-a-furby/" time_added="1450935483" tags="">Reverse Engineering a Furby | Michael Coppola's Blog</a></li> | |
<li><a href="http://www.artofmanliness.com/2015/11/02/the-power-of-conversation-a-lesson-from-cs-lewis-and-jrr-tolkien/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1450290353" tags="">http://www.artofmanliness.com/2015/11/02/the-power-of-conversation-a-lesson-from-cs-lewis-and-jrr-tolkien/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="https://www.duosecurity.com/blog/wow64-and-so-can-you" time_added="1449769000" tags="">https://www.duosecurity.com/blog/wow64-and-so-can-you</a></li> | |
<li><a href="https://gist.github.com/kholia/5807150" time_added="1449610877" tags="">Notes on ASLR and vsyscall page · GitHub</a></li> | |
<li><a href="http://researchcenter.paloaltonetworks.com/2014/12/google-chrome-exploitation-case-study/" time_added="1449610857" tags="">Google Chrome Exploitation – A Case Study - Palo Alto Networks BlogPalo Alt</a></li> | |
<li><a href="http://blog.stalkr.net/2015/12/from-remote-shell-to-remote-terminal.html?m=1" time_added="1449610838" tags="">http://blog.stalkr.net/2015/12/from-remote-shell-to-remote-terminal.html?m=1</a></li> | |
<li><a href="http://rotlogix.com/2015/11/19/inspecting-heap-objects-with-lldb/" time_added="1448766258" tags="">http://rotlogix.com/2015/11/19/inspecting-heap-objects-with-lldb/</a></li> | |
<li><a href="http://nusgreyhats.org/write-ups/HITCONCTF-Quals-2015-Simple-(Crypto-100)/" time_added="1448584867" tags="">HITCON CTF Quals 2015 - Simple (Crypto 100) – NUS Greyhats</a></li> | |
<li><a href="http://www.muppetlabs.com/~breadbox/software/tiny/teensy.html" time_added="1446488697" tags="">A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux</a></li> | |
<li><a href="https://kitctf.de/writeups/plaidctf-2015/tp/" time_added="1446488691" tags="">PlaidCTF 2015 - TP writeup</a></li> | |
<li><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2014/march/rits-ists-mobile-challenge/" time_added="1445868225" tags="">RIT’s ISTS Mobile Challenge</a></li> | |
<li><a href="https://marc-stevens.nl/p/hashclash/" time_added="1445868221" tags="">Project HashClash - Project HashClash</a></li> | |
<li><a href="https://github.com/ByteBandits/writeups/tree/master/hack.lu-ctf-2015/exploiting/Stackstuff/sudhackar" time_added="1445741586" tags="">writeups/hack.lu-ctf-2015/exploiting/Stackstuff/sudhackar at master · ByteB</a></li> | |
<li><a href="https://www.brainpickings.org/2015/10/23/nine-years-of-brain-pickings/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1445741573" tags="">https://www.brainpickings.org/2015/10/23/nine-years-of-brain-pickings/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://m.nautil.us/issue/29/scaling/metaphors-are-us-rp?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1445740922" tags="">http://m.nautil.us/issue/29/scaling/metaphors-are-us-rp?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://benkurtovic.com/2014/06/01/obfuscating-hello-world.html" time_added="1445402302" tags="">Obfuscating "Hello world!" - Ben Kurtovic</a></li> | |
<li><a href="http://beginners.re/Reverse_Engineering_for_Beginners-en.pdf" time_added="1445401955" tags="">beginners.re/Reverse_Engineering_for_Beginners-en.pdf</a></li> | |
<li><a href="https://blogs.oracle.com/ali/entry/inside_elf_symbol_tables" time_added="1445401936" tags="">Inside ELF Symbol Tables (Ali Bahrami)</a></li> | |
<li><a href="http://pastebin.com/heYvWu5Y" time_added="1445401675" tags="">8chan XSS/imgur breach - Pastebin.com</a></li> | |
<li><a href="http://montgomeryschoolsmd.org/uploadedFiles/schools/poolems/newsletter/03-12-10BackPocket.pdf" time_added="1445401669" tags="">montgomeryschoolsmd.org/uploadedFiles/schools/poolems/newsletter/03-12-10Ba</a></li> | |
<li><a href="https://beacon.nist.gov/home" time_added="1445401656" tags="">NIST Randomness Beacon (Prototype Implementation) - NIST</a></li> | |
<li><a href="http://beej.us/guide/bgnet/output/html/multipage/index.html" time_added="1444600813" tags="">Beej's Guide to Network Programming</a></li> | |
<li><a href="http://depier.re/let_s_try_radare2/" time_added="1444600801" tags="">depier.re - Let's try Radare2</a></li> | |
<li><a href="https://www.mdsec.co.uk/2015/09/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/" time_added="1444600634" tags="">An Introduction to Hardware Hacking: the RIPE Atlas probe | MDSec</a></li> | |
<li><a href="http://0x0atang.github.io/reversing/2015/09/17/flareon2-concolic.html" time_added="1444600329" tags="">· Adrian Tang · | Smashing Flare-On #2 with Concolic Testing</a></li> | |
<li><a href="http://githubengineering.com/counting-objects/" time_added="1444600272" tags="">http://githubengineering.com/counting-objects/</a></li> | |
<li><a href="http://blog.dragonsector.pl/2014/03/ructf-2014-quals-tls-crypto-300.html?m=1" time_added="1444600267" tags="">http://blog.dragonsector.pl/2014/03/ructf-2014-quals-tls-crypto-300.html?m=1</a></li> | |
<li><a href="http://haacked.com/archive/2008/11/20/anatomy-of-a-subtle-json-vulnerability.aspx/" time_added="1440605438" tags="">http://haacked.com/archive/2008/11/20/anatomy-of-a-subtle-json-vulnerability.aspx/</a></li> | |
<li><a href="https://shankaraman.wordpress.com/category/ctf/" time_added="1440432407" tags="">https://shankaraman.wordpress.com/category/ctf/</a></li> | |
<li><a href="http://learnyouahaskell.com/introduction#about-this-tutorial" time_added="1439103751" tags="">http://learnyouahaskell.com/introduction#about-this-tutorial</a></li> | |
<li><a href="http://learnyouahaskell.com/starting-out" time_added="1439103747" tags="">http://learnyouahaskell.com/starting-out</a></li> | |
<li><a href="http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pdf" time_added="1438813114" tags="">www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pd</a></li> | |
<li><a href="http://www.cis.syr.edu/~wedu/seed/" time_added="1438139945" tags="">http://www.cis.syr.edu/~wedu/seed/</a></li> | |
<li><a href="http://teaching.idallen.com/dat2343/10f/notes/040_overflow.txt" time_added="1438021969" tags="">teaching.idallen.com/dat2343/10f/notes/040_overflow.txt</a></li> | |
<li><a href="https://www.youtube.com/watch?v=td1KEUhlSuk" time_added="1437857150" tags="">livectf REDEMPTION by geohot 7/27/2014 - YouTube</a></li> | |
<li><a href="http://radare.org/doc/html/contents.html" time_added="1437857147" tags="">radare</a></li> | |
<li><a href="http://googleprojectzero.blogspot.com" time_added="1437857145" tags="">http://googleprojectzero.blogspot.com</a></li> | |
<li><a href="http://blog.gdssecurity.com/labs/2010/10/6/crypto-challenges-at-the-csaw-2010-application-ctf-qualifyin.html" time_added="1437857138" tags="">GDS - Blog - Crypto Challenges at the CSAW 2010 Application CTF Qualifying </a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-03.html?m=0" time_added="1437857134" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-03.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/04/abandoned-part-02.html?m=0" time_added="1437857134" tags="exploit,router">http://shadow-file.blogspot.com/2015/04/abandoned-part-02.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-04.html?m=0" time_added="1437857133" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-04.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-05.html?m=0" time_added="1437857132" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-05.html?m=0</a></li> | |
<li><a href="http://blog.gdssecurity.com/labs/2010/9/14/automated-padding-oracle-attacks-with-padbuster.html" time_added="1437856279" tags="cryptography,padding oracle">GDS - Blog - Automated Padding Oracle Attacks with PadBuster</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-part-08.html?m=0" time_added="1437856076" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-part-08.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-intermission.html?m=0" time_added="1437856075" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-intermission.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-part-07.html?m=0" time_added="1437856073" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-part-07.html?m=0</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-06.html?m=0" time_added="1437856071" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-06.html?m=0</a></li> | |
<li><a href="http://t-a-w.blogspot.com/2007/03/how-to-code-debuggers.html" time_added="1437855991" tags="c,debugger">taw's blog: How to code debuggers</a></li> | |
<li><a href="http://time.com/3955673/ant-man-paul-rudd-ants/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1437855970" tags="">http://time.com/3955673/ant-man-paul-rudd-ants/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits</a></li> | |
<li><a href="http://www.reteam.org/challenges.html" time_added="1437855919" tags="challenge,reverse">Reverse Engineering Team</a></li> | |
<li><a href="http://securityevaluators.com/knowledge/papers/engineeringheapoverflow.pdf" time_added="1437855889" tags="exploitation,heap">securityevaluators.com/knowledge/papers/engineeringheapoverflow.pdf</a></li> | |
<li><a href="http://files.accuvant.com/web/file/4a2a88cc7dec477096b88e19eba57969/White Paper- pwn2own_2013__java_7_se_memory_corruption.pdf" time_added="1437855786" tags="exploitation,java">http://files.accuvant.com/web/file/4a2a88cc7dec477096b88e19eba57969/White Paper- pwn2own_2013__java_7_se_memory_corruption.pdf</a></li> | |
<li><a href="https://srlabs.de/blog/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec-v2.pdf" time_added="1437854750" tags="usb">https://srlabs.de/blog/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec-v2.p</a></li> | |
<li><a href="http://theamazingking.com/crypto-linear.php" time_added="1437854613" tags="cryptography">The Amazing King - Linear Cryptanalysis Tutorial</a></li> | |
<li><a href="http://blog.ioactive.com/2015/07/differential-cryptanalysis-for-dummies.html?m=1" time_added="1437854600" tags="cryptography">http://blog.ioactive.com/2015/07/differential-cryptanalysis-for-dummies.html?m=1</a></li> | |
<li><a href="http://www.monocacymonocle.com/images/issues_2010/MM_2010-04-16.pdf" time_added="1437854036" tags="me">http://www.monocacymonocle.com/images/issues_2010/MM_2010-04-16.pdf</a></li> | |
<li><a href="http://getpocket.com/s/oPyNL?cta=1" time_added="1437848978" tags="">http://getpocket.com/s/oPyNL?cta=1</a></li> | |
<li><a href="https://ryiron.wordpress.com/2013/09/05/kptr_restrict-finding-kernel-symbols-for-shell-code/" time_added="1437616157" tags="kernel,linux,shellcode">kptr_restrict – Finding kernel symbols for shell code | ~ryiron</a></li> | |
<li><a href="http://www.phreedom.org/research/heap-feng-shui/heap-feng-shui.html" time_added="1437578501" tags="">Heap Feng Shui in JavaScript</a></li> | |
<li><a href="http://blog.quarkslab.com/turning-regular-code-into-atrocities-with-llvm.html" time_added="1437543981" tags="fuzzing,llvm">Turning Regular Code Into Atrocities With LLVM</a></li> | |
<li><a href="http://seclists.org/bugtraq/2012/Feb/178" time_added="1437543926" tags="">Bugtraq: Reliable Windows 7 Exploitation: A Case Study</a></li> | |
<li><a href="http://llvm.org/docs/LibFuzzer.html#heartbleed" time_added="1437285385" tags="fuzzing">LibFuzzer – a library for coverage-guided fuzz testing. — LLVM 3.8 document</a></li> | |
<li><a href="http://ifsec.blogspot.com/2011/06/memory-disclosure-technique-for.html" time_added="1437160647" tags="browser,disclosure,technique">Ivan Fratric's Security Blog: Memory disclosure technique for Internet Expl</a></li> | |
<li><a href="http://www.wilfred.me.uk/blog/2015/02/21/my-first-llvm-compiler/" time_added="1437160404" tags="fuzzing">My First LLVM Compiler | Wilfred Hughes :: Blog</a></li> | |
<li><a href="http://resources.infosecinstitute.com/cbc-byte-flipping-attack-101-approach/" time_added="1437159308" tags="cbc,crypto,encryption">CBC Byte Flipping Attack—101 Approach - InfoSec Institute</a></li> | |
<li><a href="http://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/" time_added="1437159169" tags="">How We Fared in the Cyber Grand Challenge – Trail of Bits Blog</a></li> | |
<li><a href="https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-WP.pdf" time_added="1436811233" tags="fonts,fuzzing">https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-WP.pd</a></li> | |
<li><a href="https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-WP.pdf" time_added="1436811232" tags="font,fuzzing">https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine</a></li> | |
<li><a href="https://cansecwest.com/csw11/Borken%20Fonts%20-%20Schoenefeld.pdf" time_added="1436811231" tags="fonts,fuzzing">https://cansecwest.com/csw11/Borken Fonts - Schoenefeld.pdf</a></li> | |
<li><a href="http://blog.azimuthsecurity.com/2013/02/re-visiting-exynos-memory-mapping-bug.html" time_added="1436395354" tags="android,root">Azimuth Security: Re-visiting the Exynos Memory Mapping Bug</a></li> | |
<li><a href="https://blog.coresecurity.com/2015/03/25/exploiting-cve-2015-0311-part-ii-bypassing-control-flow-guard-on-windows-8-1-update-3/" time_added="1436395105" tags="exploit,mitigation,windows">Bypassing Control Flow Guard on Windows 8.1 | Core Security Blog</a></li> | |
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301" time_added="1436334285" tags="ctf,heap">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301</a></li> | |
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299" time_added="1436334285" tags="ctf,heap">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299</a></li> | |
<li><a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-SQL-Injection-Challenge--Lessons-Learned/" time_added="1436334269" tags="sql injection,web">ModSecurity SQL Injection Challenge: Lessons Learned</a></li> | |
<li><a href="http://dustri.org/b/defeating-ioli-with-radare2.html" time_added="1436334257" tags="radare">http://dustri.org/b/defeating-ioli-with-radare2.html</a></li> | |
<li><a href="http://radare.today/radare2-is-documented/" time_added="1436334256" tags="radare">http://radare.today/radare2-is-documented/</a></li> | |
<li><a href="http://0xax.gitbooks.io/linux-insides/content/index.html" time_added="1436334005" tags="linux">Introduction | linux-insides</a></li> | |
<li><a href="http://googleprojectzero.blogspot.de/2014/11/pwn4fun-spring-2014-safari-part-ii.html" time_added="1436333957" tags="browser,exploit,safari">Project Zero: pwn4fun Spring 2014 - Safari - Part II</a></li> | |
<li><a href="http://blog.ioactive.com/2012/12/striking-back-gdb-and-ida-debuggers.html" time_added="1436333936" tags="antireversing,elf,gdb,ida">IOActive Labs Research: Striking Back GDB and IDA debuggers through malform</a></li> | |
<li><a href="http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html" time_added="1436333877" tags="arm,ctf">Mathy Vanhoef: Reversing and Exploiting ARM Binaries: rwthCTF Trafman</a></li> | |
<li><a href="http://gaasedelen.blogspot.com/2014/11/landing-agres-links-500-csaw-ctf-2014.html" time_added="1436333856" tags="ctf windows">Landing Agre's Links 500 - CSAW CTF 2014 Finals | Bigger Than Bytes</a></li> | |
<li><a href="http://felixcloutier.com/greenhorn/" time_added="1436333849" tags="ctf,windows">Greenhorn–the anatomy of a Windows 8 program exploit</a></li> | |
<li><a href="http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/" time_added="1436333840" tags="hardware,re,router">http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/</a></li> | |
<li><a href="https://kitctf.de/writeups/0ctf2015/freenote/" time_added="1436333827" tags="ctf,heap">https://kitctf.de/writeups/0ctf2015/freenote/</a></li> | |
<li><a href="http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/" time_added="1436333809" tags="symbolic execution,z3">http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/</a></li> | |
<li><a href="http://nest.unm.edu/files/5514/1254/9114/Malware_Analysis_with_Vivsect.pdf" time_added="1436333779" tags="malware,vdb">nest.unm.edu/files/5514/1254/9114/Malware_Analysis_with_Vivsect.pdf</a></li> | |
<li><a href="https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-atlas.pdf" time_added="1436333767" tags="debug,vdb">https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-atlas.</a></li> | |
<li><a href="http://lar5.com/cube/" time_added="1436333745" tags="cube">http://lar5.com/cube/</a></li> | |
<li><a href="https://intrepidusgroup.com/insight/2014/03/rits-ists-mobile-challenge/" time_added="1436333731" tags="android,challenge,ctf">https://intrepidusgroup.com/insight/2014/03/rits-ists-mobile-challenge/</a></li> | |
<li><a href="http://acko.net/blog/animate-your-way-to-glory/" time_added="1436333719" tags="javascript">http://acko.net/blog/animate-your-way-to-glory/</a></li> | |
<li><a href="https://www.alchemistowl.org/pocorgtfo/pocorgtfo06.pdf" time_added="1436333584" tags="pocgtfo">pocorgtfo06.pdf</a></li> | |
<li><a href="https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf" time_added="1436333482" tags="browser,mitigations">Bypassing Browser Memory Protections - bh08-sotirov-dowd.pdf</a></li> | |
<li><a href="http://munkschool.utoronto.ca/canadacentre/research/backdoors-are-forever/" time_added="1436333465" tags="backdoor">Backdoors are Forever: Hacking Team and the Targeting of Dissent? | Canada </a></li> | |
<li><a href="http://vulnfactory.org/exploits/full-nelson.c" time_added="1436333404" tags="exploit,kernel,linux">vulnfactory.org/exploits/full-nelson.c</a></li> | |
<li><a href="http://www.theatlantic.com/magazine/archive/2015/07/world-without-work/395294/?utm_source=pocket&utm_medium=email&utm_campaign=pockethits" time_added="1436333377" tags="">A World Without Work - The Atlantic</a></li> | |
<li><a href="http://users.ics.forth.gr/~elathan/papers/ndss15.pdf" time_added="1436333328" tags="browser,bypass,mitigation">users.ics.forth.gr/~elathan/papers/ndss15.pdf</a></li> | |
<li><a href="http://seclists.org/oss-sec/2015/q3/25" time_added="1436333309" tags="exploit,kernel,linux">http://seclists.org/oss-sec/2015/q3/25</a></li> | |
<li><a href="https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/" time_added="1436333242" tags="linux,tutorial">https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/</a></li> | |
<li><a href="http://www.anti-reversing.com/cve-2015-1438/" time_added="1436333229" tags="exploit">The A.R.F Project© » CVE-2015-1438 – Panda Security Multiple Products Arbit</a></li> | |
<li><a href="http://repo.hackerzvoice.net/depot_madchat/vxdevl/papers/winsys/pefile/pefile.htm" time_added="1436333161" tags="elf,format">PE File Structure</a></li> | |
<li><a href="http://flint.cs.yale.edu/cs422/doc/ELF_Format.pdf" time_added="1436333077" tags="elf,format">flint.cs.yale.edu/cs422/doc/ELF_Format.pdf</a></li> | |
<li><a href="https://beistlab.files.wordpress.com/2012/10/isec_2012_beist_slides.pdf" time_added="1436333058" tags="bug hunting,vulnerabilities">https://beistlab.files.wordpress.com/2012/10/isec_2012_beist_slides.pdf</a></li> | |
<li><a href="http://expdev-kiuhnm.rhcloud.com/2015/05/11/contents/" time_added="1436332974" tags="exploit,tutorial,windows">Contents - Exploit Development Community</a></li> | |
<li><a href="http://blog.silentsignal.eu/" time_added="1436332926" tags="pentesting,web">Silent Signal Techblog | Because we can!</a></li> | |
<li><a href="https://code.google.com/p/google-security-research/issues/detail?id=364#c3" time_added="1436332889" tags="browser,chrome,exploit">Issue 364 - google-security-research - Chrome heap overflow in CertificateR</a></li> | |
<li><a href="https://drive.google.com/file/d/0Bxvv8gduedamTEJCUlN6eERtWUE/view" time_added="1436332868" tags="browser,c++,chrome,exploit">Detect Bad-Casting at Runtime with Undefined Sanitizer.pdf - Google Drive</a></li> | |
<li><a href="https://code.google.com/p/chromium/issues/attachmentText?id=35724&aid=126993484832405244&name=Pwnium-1.3.html&token=feb53c401c565218ebbb4e57977988f2" time_added="1436332867" tags="browser,chrome,exploit">Pwnium-1.3.html (59.3 KB) - chromium - An open-source project to help move </a></li> | |
<li><a href="http://dl.aircrack-ng.org/breakingwepandwpa.pdf" time_added="1436318136" tags="project,wep,wifi">dl.aircrack-ng.org/breakingwepandwpa.pdf</a></li> | |
<li><a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt" time_added="1435594899" tags="exploit,hacknight,linux">https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt</a></li> | |
<li><a href="https://rh0dev.github.io/blog/2015/fun-with-info-leaks/" time_added="1435537066" tags="exploit,ie">Fun With Info-Leaks - </a></li> | |
<li><a href="http://fr.slideshare.net/hibouchinois/wp8-49181967" time_added="1435537063" tags="exploit,phone">Wp8</a></li> | |
<li><a href="https://nakedsecurity.sophos.com/2013/10/11/anatomy-of-an-exploit-ie-zero-day-part-1/" time_added="1435537057" tags="exploit,ie">Anatomy of an exploit – inside the CVE-2013-3893 Internet Explorer zero-day</a></li> | |
<li><a href="http://shadow-file.blogspot.com/2015/04/abandoned-part-01.html" time_added="1435194917" tags="exploit,router">http://shadow-file.blogspot.com/2015/04/abandoned-part-01.html</a></li> | |
<li><a href="https://github.com/0vercl0k/z3-playground/blob/master/solve_nsc2014_step1_z3.py" time_added="1435189445" tags="">https://github.com/0vercl0k/z3-playground/blob/master/solve_nsc2014_step1_z3.py</a></li> | |
<li><a href="https://ctf-team.vulnhub.com/hack-dot-lu-2014-the-union/" time_added="1435189440" tags="">https://ctf-team.vulnhub.com/hack-dot-lu-2014-the-union/</a></li> | |
<li><a href="http://www.singlehop.com/blog/binary-vivisection-part-1/" time_added="1435189420" tags="">Binary Vivisection (Part 1) | SingleHop</a></li> | |
<li><a href="http://doar-e.github.io/blog/2013/09/16/breaking-kryptonites-obfuscation-with-symbolic-execution/" time_added="1435189413" tags="">http://doar-e.github.io/blog/2013/09/16/breaking-kryptonites-obfuscation-with-symbolic-execution/</a></li> | |
<li><a href="http://wiki.yobi.be/wiki/Reverse-Engineering#QIRA" time_added="1435189397" tags="">Reverse-Engineering - YobiWiki</a></li> | |
<li><a href="http://mslc.ctf.su/wp/codegate-2014-quals-angry-doraemon-pwn-250/" time_added="1435014841" tags="">http://mslc.ctf.su/wp/codegate-2014-quals-angry-doraemon-pwn-250/</a></li> | |
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1076" time_added="1435014820" tags="">http://ppp.cylab.cmu.edu/wordpress/?p=1076</a></li> | |
<li><a href="https://pentest.com/ios_backdoors_attack_points_surveillance_mechanisms.pdf" time_added="1435014811" tags="">https://pentest.com/ios_backdoors_attack_points_surveillance_mechanisms.pdf</a></li> | |
<li><a href="http://www.embedded.com/electronics-blogs/cole-bin/4438476/The-challenges-of-printed-circuit-board-design-and-debug" time_added="1435014228" tags="">http://www.embedded.com/electronics-blogs/cole-bin/4438476/The-challenges-of-printed-circuit-board-design-and-debug</a></li> | |
<li><a href="http://troydhanson.github.io/misc/bloom.html" time_added="1435014212" tags="">http://troydhanson.github.io/misc/bloom.html</a></li> | |
<li><a href="http://powerofcommunity.net/poc2014/tombkeeper.pdf" time_added="1435014096" tags="">http://powerofcommunity.net/poc2014/tombkeeper.pdf</a></li> | |
<li><a href="https://cansecwest.com/slides/2014/ROPs_are_for_the_99_CanSecWest_2014.pdf" time_added="1435014081" tags="">https://cansecwest.com/slides/2014/ROPs_are_for_the_99_CanSecWest_2014.pdf</a></li> | |
<li><a href="https://www.blackhat.com/docs/us-14/materials/us-14-Yu-Write-Once-Pwn-Anywhere.pdf" time_added="1435014073" tags="">https://www.blackhat.com/docs/us-14/materials/us-14-Yu-Write-Once-Pwn-Anywhere.pdf</a></li> | |
<li><a href="https://www.openssl.org/~bodo/ssl-poodle.pdf" time_added="1434895505" tags="">https://www.openssl.org/~bodo/ssl-poodle.pdf</a></li> | |
<li><a href="https://www.exploit-db.com/papers/17167/" time_added="1434866864" tags="">https://www.exploit-db.com/papers/17167/</a></li> | |
<li><a href="https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html" time_added="1433977171" tags="chromecast,exploit,hardware">https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html</a></li> | |
<li><a href="http://radare.today/solving-at-gunpoint-from-hack-lu-2014-with-radare2/" time_added="1433010439" tags="ctf,gba,radare">http://radare.today/solving-at-gunpoint-from-hack-lu-2014-with-radare2/</a></li> | |
<li><a href="https://cseweb.ucsd.edu/~hovav/dist/tex-login.pdf" time_added="1432103193" tags="exploit,latex,whitepaper">https://cseweb.ucsd.edu/~hovav/dist/tex-login.pdf</a></li> | |
<li><a href="http://radare.today/visual-mode/" time_added="1432102790" tags="radare">Visual mode</a></li> | |
<li><a href="http://cseweb.ucsd.edu/~hovav/dist/geometry.pdf" time_added="1432102743" tags="">cseweb.ucsd.edu/~hovav/dist/geometry.pdf</a></li> | |
<li><a href="http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html?m=1" time_added="1431391969" tags="collision,hash,md5">http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html?m=1</a></li> | |
<li><a href="http://theiphonewiki.com/wiki/Limera1n_Exploit" time_added="1430954442" tags="apple,exploit">http://theiphonewiki.com/wiki/Limera1n_Exploit</a></li> | |
<li><a href="https://www.nowsecure.com/blog/2013/10/02/chained-vulnerabilities-firefox-android-pimp-browser/" time_added="1430890200" tags="android,exploit,firefox">https://www.nowsecure.com/blog/2013/10/02/chained-vulnerabilities-firefox-android-pimp-browser/</a></li> | |
<li><a href="http://shellsherpa.nl/stealing-keepasswords-with-vivisect" time_added="1430713204" tags="vdb">Stealing KeePass(words) with Vivisect</a></li> | |
<li><a href="http://www.exploit-db.com/papers/24085/" time_added="1430558731" tags="exploit,stack">http://www.exploit-db.com/papers/24085/</a></li> | |
<li><a href="https://ctf-team.vulnhub.com/picoctf-2014-fancy-cache/" time_added="1430281038" tags="">https://ctf-team.vulnhub.com/picoctf-2014-fancy-cache/</a></li> | |
<li><a href="https://ctf-team.vulnhub.com/picoctf-2014-hardcore-rop/" time_added="1430279794" tags="">https://ctf-team.vulnhub.com/picoctf-2014-hardcore-rop/</a></li> | |
<li><a href="http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/" time_added="1430278675" tags="">http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/</a></li> | |
<li><a href="http://blog.apiad.net/procedural-terrain-generation-in-unity-3d-part-iii/" time_added="1430278667" tags="">http://blog.apiad.net/procedural-terrain-generation-in-unity-3d-part-iii/</a></li> | |
<li><a href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/" time_added="1430278661" tags="">https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/</a></li> | |
<li><a href="https://eindbazen.net/2014/04/plaidctf-2014-tenement-100/" time_added="1430278657" tags="">https://eindbazen.net/2014/04/plaidctf-2014-tenement-100/</a></li> | |
<li><a href="http://quill18.com/unity_tutorials/" time_added="1430278643" tags="">Quill18's Unity 3d & Blender Programming Tutorials</a></li> | |
<li><a href="http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php" time_added="1430198800" tags="">http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php</a></li> | |
<li><a href="http://poppopret.org/2013/11/20/csaw-ctf-2013-kernel-exploitation-challenge/" time_added="1429813831" tags="">http://poppopret.org/2013/11/20/csaw-ctf-2013-kernel-exploitation-challenge/</a></li> | |
<li><a href="http://shell-storm.org/blog/Concolic-execution-taint-analysis-with-valgrind-and-constraints-path-solver-with-z3/" time_added="1429290817" tags="">http://shell-storm.org/blog/Concolic-execution-taint-analysis-with-valgrind-and-constraints-path-solver-with-z3/</a></li> | |
<li><a href="https://www.mandiant.com/blog/custom-vdb-debugger-exploit-analysis/" time_added="1429250076" tags="">https://www.mandiant.com/blog/custom-vdb-debugger-exploit-analysis/</a></li> | |
<li><a href="http://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/" time_added="1428405884" tags="">Close Encounters with Symbolic Execution (Part 2) – ...And You Will Know Us</a></li> | |
<li><a href="http://broot.ca/csaw2013-crypto-100" time_added="1428365199" tags="">http://broot.ca/csaw2013-crypto-100</a></li> | |
<li><a href="http://ropshell.com/peda/Linux_Interactive_Exploit_Development_with_GDB_and_PEDA_Slides.pdf" time_added="1428141329" tags="">ropshell.com/peda/Linux_Interactive_Exploit_Development_with_GDB_and_PEDA_</a></li> | |
<li><a href="https://github.com/gaffe23/gaffe-ota2/tree/master/egregiously-catastrophic-bifurcation" time_added="1428141281" tags="">gaffe-ota2/egregiously-catastrophic-bifurcation at master · gaffe23/gaffe-o</a></li> | |
<li><a href="http://www.thegeekstuff.com/2012/04/create-threads-in-linux/" time_added="1428141024" tags="">http://www.thegeekstuff.com/2012/04/create-threads-in-linux/</a></li> | |
<li><a href="http://pbiernat.blogspot.com/2014/09/bypassing-python-sandbox-by-abusing.html" time_added="1428140632" tags="">http://pbiernat.blogspot.com/2014/09/bypassing-python-sandbox-by-abusing.html</a></li> | |
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1165" time_added="1427869514" tags="">Codegate 2014: membership (800pt pwnable) write-up | :: Plaid Parliament of</a></li> | |
<li><a href="http://blog.ioactive.com/2014/11/elf-parsing-bugs-by-example-with-melkor.html" time_added="1427612768" tags="">IOActive Labs Research: ELF Parsing Bugs by Example with Melkor Fuzzer</a></li> | |
<li><a href="http://phrack.org/issues/67/13.html" time_added="1427601673" tags="">http://phrack.org/issues/67/13.html</a></li> | |
<li><a href="http://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb.html" time_added="1427589841" tags="">http://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb.html</a></li> | |
<li><a href="http://www.codeproject.com/Articles/4210/C-Reverse-Disassembly" time_added="1427589783" tags="">http://www.codeproject.com/Articles/4210/C-Reverse-Disassembly</a></li> | |
<li><a href="http://dfir.org/?q=node/8" time_added="1427589779" tags="">http://dfir.org/?q=node/8</a></li> | |
<li><a href="https://www.youtube.com/watch?v=j5NciKpHZzs" time_added="1427589764" tags="re">Reverse engineering vendor firmware drivers for little fun and no profit [l</a></li> | |
<li><a href="http://www.slideshare.net/reed2001/culture-1798664" time_added="1427589756" tags="">Culture</a></li> | |
<li><a href="http://www.0xebfe.net/blog/2015/01/24/ghost-in-the-shellcode-2015-pirates-treasure-500-write-up/" time_added="1427029651" tags="">Ghost in the Shellcode 2015: Pirate’s Treasure 500 write-up - 0xEBFE</a></li> | |
<li><a href="http://loccs.sjtu.edu.cn/~evermars/blog/2015/03/17/dodocrackme2_writeup/" time_added="1426875203" tags="">Codegate CTF 2015 Dodocrackme2 Write Up - EverMars</a></li> | |
<li><a href="https://medium.com/@shanewilton/ghost-in-the-shellcode-2015-blockys-revenge-7074a119115e" time_added="1426875194" tags="">Ghost in the Shellcode 2015 — Blocky’s Revenge — Medium</a></li> | |
<li><a href="http://homakov.blogspot.com/2014/02/how-i-hacked-github-again.html?m=1" time_added="1426568956" tags="">http://homakov.blogspot.com/2014/02/how-i-hacked-github-again.html?m=1</a></li> | |
<li><a href="http://firstround.com/article/From-0-to-1B-Slacks-Founder-Shares-Their-Epic-Launch-Strategy" time_added="1426568951" tags="">http://firstround.com/article/From-0-to-1B-Slacks-Founder-Shares-Their-Epic-Launch-Strategy</a></li> | |
<li><a href="http://www.html5rocks.com/en/tutorials/casestudies/racer/" time_added="1426568934" tags="">Case Study: Building Racer - HTML5 Rocks</a></li> | |
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1146" time_added="1426568927" tags="">GiTS 2014: fuzzy | :: Plaid Parliament of Pwning ::</a></li> | |
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1152" time_added="1426568922" tags="">GiTS 2014: gitsmsg | :: Plaid Parliament of Pwning ::</a></li> | |
<li><a href="http://stackoverflow.com/questions/13159564/explain-this-implementation-of-malloc-from-the-kr-book" time_added="1426568912" tags="">c - Explain this implementation of malloc from the K&R book - Stack Overflo</a></li> | |
<li><a href="http://danluu.com/malloc-tutorial/" time_added="1426568907" tags="">http://danluu.com/malloc-tutorial/</a></li> | |
<li><a href="http://youtu.be/j2HSd3HCpDs" time_added="1426568903" tags="">http://youtu.be/j2HSd3HCpDs</a></li> | |
<li><a href="http://www.ccs.neu.edu/home/jnl22/oldsite/cshonor/jeff.html" time_added="1426568900" tags="">http://www.ccs.neu.edu/home/jnl22/oldsite/cshonor/jeff.html</a></li> | |
<li><a href="https://blog.skullsecurity.org/2014/plaidctf-writeup-for-pwn-275-kappa-type-confusion-vuln" time_added="1426568890" tags="">https://blog.skullsecurity.org/2014/plaidctf-writeup-for-pwn-275-kappa-type-confusion-vuln</a></li> | |
<li><a href="http://resources.infosecinstitute.com/padding-oracle-attack-2/" time_added="1426568883" tags="">http://resources.infosecinstitute.com/padding-oracle-attack-2/</a></li> | |
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100" time_added="1426568875" tags="">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100</a></li> | |
<li><a href="http://defcon.org/html/links/dc-archives/dc-18-archive.html" time_added="1426568870" tags="">DEF CON® Hacking Conference - DEF CON 18 Archive</a></li> | |
<li><a href="https://www.youtube.com/watch?v=fEmO7wQKCMw" time_added="1426568866" tags="defcon">DEFCON 18: How I Met Your Girlfriend 1/3 - YouTube</a></li> | |
<li><a href="http://blog.exodusintel.com/2013/01/07/who-was-phone/" time_added="1426050341" tags="">http://blog.exodusintel.com/2013/01/07/who-was-phone/</a></li> | |
<li><a href="http://broot.ca/gitsctf-pillowtalk-crypto-200" time_added="1426002653" tags="">http://broot.ca/gitsctf-pillowtalk-crypto-200</a></li> | |
<li><a href="https://maijin.github.io/radare2book/introduction/getting_radare.html" time_added="1425880025" tags="">https://maijin.github.io/radare2book/introduction/getting_radare.html</a></li> | |
<li><a href="http://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/" time_added="1425880010" tags="">http://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execu</a></li> | |
<li><a href="http://en.m.wikipedia.org/wiki/Symbolic_execution" time_added="1425879423" tags="">http://en.m.wikipedia.org/wiki/Symbolic_execution</a></li> | |
<li><a href="https://vagosec.org/2013/09/wordpress-php-object-injection/" time_added="1425879400" tags="">https://vagosec.org/2013/09/wordpress-php-object-injection/</a></li> | |
<li><a href="http://resources.infosecinstitute.com/xml-vulnerabilities/" time_added="1425879387" tags="">XML vulnerabilities - InfoSec Institute</a></li> | |
<li><a href="https://www.blackhat.com/presentations/bh-usa-07/Amini_and_Portnoy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf" time_added="1425879382" tags="">https://www.blackhat.com/presentations/bh-usa-07/Amini_and_Portnoy/Whitepap</a></li> | |
<li><a href="http://blog.astrumfutura.com/2012/03/a-hitchhikers-guide-to-cross-site-scripting-xss-in-php-part-1-how-not-to-use-htmlspecialchars-for-output-escaping/" time_added="1425879363" tags="">A Hitchhiker’s Guide to Cross-Site Scripting (XSS) in PHP (Part 1): How Not</a></li> | |
<li><a href="http://crypto.stanford.edu/~blynn/rop/" time_added="1425848358" tags="">64-bit Linux Return-Oriented Programming</a></li> | |
<li><a href="https://github.com/thmsmlr/ctf-writeups/tree/master/2014-seccon/binary-karuta" time_added="1425393812" tags="">ctf-writeups/2014-seccon/binary-karuta at master · thmsmlr/ctf-writeups</a></li> | |
<li><a href="http://blog.cryptographyengineering.com/?m=1" time_added="1425393692" tags="cryptography">http://blog.cryptographyengineering.com/?m=1</a></li> | |
<li><a href="http://kitctf.de/writeups/gits2015/aart/" time_added="1424884867" tags="">GITS 2015 CTF 'aart' writeup</a></li> | |
<li><a href="http://www.cryptofails.com/" time_added="1424884519" tags="cryptography">http://www.cryptofails.com/</a></li> | |
<li><a href="https://www.arneswinnen.net/2013/11/hack-lu-2013-ctf-wannabe-writeup-part-one-web-exploitation/" time_added="1424884170" tags="">https://www.arneswinnen.net/2013/11/hack-lu-2013-ctf-wannabe-writeup-part-one-web-exploitation/</a></li> | |
<li><a href="http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet" time_added="1424884161" tags="">Reverse Shell Cheat Sheet | pentestmonkey</a></li> | |
<li><a href="https://msdn.microsoft.com/en-us/library/ms220938(v=vs.90).aspx" time_added="1424026692" tags="">The Structure of a Page Heap Block</a></li> | |
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/27/9" time_added="1423635684" tags="">http://www.openwall.com/lists/oss-security/2015/01/27/9</a></li> | |
<li><a href="http://www.vice.com/read/nasa-patient-8179-200?utm_source=vicefbus" time_added="1423635088" tags="">How I Felt After 70 Days of Lying in Bed for Science | VICE | United States</a></li> | |
<li><a href="https://www.youtube.com/watch?v=5pOxlazS3zs" time_added="1421800597" tags="linux">"Linux Sucks" - 2014 - YouTube</a></li> | |
<li><a href="http://en.m.wikipedia.org/wiki/Birthday_attack" time_added="1421800536" tags="">http://en.m.wikipedia.org/wiki/Birthday_attack</a></li> | |
<li><a href="http://v0ids3curity.blogspot.com/2013/12/30c3-ctf-sandbox-300-int80-team-segfault.html?m=1" time_added="1421800514" tags="">http://v0ids3curity.blogspot.com/2013/12/30c3-ctf-sandbox-300-int80-team-segfault.html?m=1</a></li> | |
<li><a href="http://forensics.spreitzenbarth.de/" time_added="1421788197" tags="">forensic blog</a></li> | |
<li><a href="https://mobileforensics.wordpress.com/category/android-forensics/" time_added="1421788184" tags="">Android Forensics | Mobile Device Forensics</a></li> | |
<li><a href="http://lockboxx.blogspot.com/2014/01/ghost-in-shellcode-2014-ctf-writeup.html" time_added="1421787459" tags="">LockBoxx: Ghost in the ShellCode 2014 CTF WriteUp: Choose Your Pwn Adventur</a></li> | |
<li><a href="http://www.marvelousbreadchris.me/?p=17" time_added="1420858979" tags="">http://www.marvelousbreadchris.me/?p=17</a></li> | |
<li><a href="http://mattmahoney.net/dc/dce.html" time_added="1420815179" tags="compression">Data Compression Explained</a></li> | |
<li><a href="http://parsingintro.sourceforge.net/" time_added="1420815173" tags="compilers">How parsers and compilers work</a></li> | |
<li><a href="http://gnoobz.com/ebctf-2013-bin-300-crack-the-password.html" time_added="1420815166" tags="">http://gnoobz.com/ebctf-2013-bin-300-crack-the-password.html</a></li> | |
<li><a href="http://captf.com/practice-ctf/" time_added="1420742410" tags="">http://captf.com/practice-ctf/</a></li> | |
<li><a href="https://blog.skullsecurity.org/2013/epic-cnot-writeup-plaidctf" time_added="1420742324" tags="">https://blog.skullsecurity.org/2013/epic-cnot-writeup-plaidctf</a></li> | |
<li><a href="http://cs.lmu.edu/~ray/notes/introcompilers/" time_added="1420739932" tags="compilers">Introduction to Compilers</a></li> | |
<li><a href="https://blog.skullsecurity.org/2014/defcon-quals-writeup-for-byhd-reversing-a-huffman-tree" time_added="1420736706" tags="">https://blog.skullsecurity.org/2014/defcon-quals-writeup-for-byhd-reversing-a-huffman-tree</a></li> | |
<li><a href="https://www.schneier.com/" time_added="1420736051" tags="">https://www.schneier.com/</a></li> | |
<li><a href="http://developer.android.com/guide/topics/connectivity/nfc/nfc.html" time_added="1420736035" tags="">http://developer.android.com/guide/topics/connectivity/nfc/nfc.html</a></li> | |
<li><a href="https://github.com/bidord/pykek" time_added="1420736028" tags="">bidord/pykek</a></li> | |
<li><a href="http://www.apriorit.com/dev-blog/255-android-rooting" time_added="1420735948" tags="">Android Rooting for Programmers</a></li> | |
<li><a href="http://developer.android.com/guide/topics/connectivity/nfc/advanced-nfc.html#top" time_added="1420735132" tags="">http://developer.android.com/guide/topics/connectivity/nfc/advanced-nfc.html#top</a></li> | |
<li><a href="http://stackoverflow.com/questions/5741187/sql-injection-that-gets-around-mysql-real-escape-string" time_added="1420735117" tags="sql injection">php - SQL injection that gets around mysql_real_escape_string() - Stack Ove</a></li> | |
<li><a href="http://gnoobz.com/defcon-ctf-quals-2013-xffxe4xcc-300-linked.html" time_added="1420734654" tags="">http://gnoobz.com/defcon-ctf-quals-2013-xffxe4xcc-300-linked.html</a></li> | |
<li><a href="https://forum.exploitee.rs/google-chromecast-f48/topic1604.html" time_added="1420734445" tags="">https://forum.exploitee.rs/google-chromecast-f48/topic1604.html</a></li> | |
<li><a href="http://shell-storm.org/blog/Linux-process-execution-and-the-useless-ELF-header-fields/" time_added="1420734441" tags="elf,format,fuzzing">http://shell-storm.org/blog/Linux-process-execution-and-the-useless-ELF-header-fields/</a></li> | |
<li><a href="http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-invisible-150-write-up/#more-1092" time_added="1419968527" tags="compilers">http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-invisible-150-write-up/#more-1092</a></li> | |
<li><a href="http://moyix.blogspot.com/2013/09/announcing-panda-platform-for.html" time_added="1419968496" tags="">http://moyix.blogspot.com/2013/09/announcing-panda-platform-for.html</a></li> | |
<li><a href="http://moyix.blogspot.com/2014/07/breaking-spotify-drm-with-panda.html" time_added="1419968488" tags="crypto,project">http://moyix.blogspot.com/2014/07/breaking-spotify-drm-with-panda.html</a></li> | |
<li><a href="http://www.newyorker.com/culture/richard-brody/the-life-lessons-of-spring-breakers" time_added="1419014990" tags="">http://www.newyorker.com/culture/richard-brody/the-life-lessons-of-spring-breakers</a></li> | |
<li><a href="http://wiremask.eu/category/tutorials/" time_added="1418862783" tags="">http://wiremask.eu/category/tutorials/</a></li> | |
<li><a href="http://fastcompression.blogspot.com/2011/05/lz4-explained.html" time_added="1418150042" tags="">RealTime Data Compression: LZ4 explained</a></li> | |
<li><a href="https://fixme.ch/wiki/CTF" time_added="1418074970" tags="">https://fixme.ch/wiki/CTF</a></li> | |
<li><a href="http://stackoverflow.com/questions/15978204/what-are-javascripts-builtin-strings" time_added="1417997813" tags="fun,javascript">obfuscation - What are JavaScript's builtin strings? - Stack Overflow</a></li> | |
<li><a href="http://blog.opensecurityresearch.com/2014/07/writing-slack-space-on-windows.html?m=1" time_added="1417895469" tags="">http://blog.opensecurityresearch.com/2014/07/writing-slack-space-on-windows.html?m=1</a></li> | |
<li><a href="http://tasteless.se/2014/08/hitcon-ctf-2014-callme-exploiting-350/" time_added="1417895457" tags="">http://tasteless.se/2014/08/hitcon-ctf-2014-callme-exploiting-350/</a></li> | |
<li><a href="http://jsfiddle.net/w9rFF/14/" time_added="1417895445" tags="fun,javascript">Edit fiddle - JSFiddle</a></li> | |
<li><a href="http://counterhack.net/Counter_Hack/Articles.html" time_added="1417558469" tags="">http://counterhack.net/Counter_Hack/Articles.html</a></li> | |
<li><a href="http://blog.commandlinekungfu.com/2010/01/episode-77-usb-history.html?m=1" time_added="1417234707" tags="">http://blog.commandlinekungfu.com/2010/01/episode-77-usb-history.html?m=1</a></li> | |
</ul> | |
</body> | |
</html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment