Hacker Newsnew | past | comments | ask | show | jobs | submit | evilsocket's submissionslogin
1.Mongoose: Preauth RCE and MTLS Bypass on Devices (evilsocket.net)
2 points by evilsocket 7 days ago | past | 1 comment
2.Open sourcing Nerve, a tool to instrument LLMs to perform tasks, without code (github.com/evilsocket)
4 points by evilsocket on June 22, 2024 | past | 1 comment
3.Cryptographic failures in RF encryption allow stealing robotic devices (cossacklabs.com)
63 points by evilsocket on June 29, 2022 | past | 17 comments
4.Weaponizing and Gamifying AI for WiFi Hacking: Presenting Pwnagotchi 1.0.0 (evilsocket.net)
3 points by evilsocket on Oct 19, 2019 | past
5.How to Create a Malware Detection System with Machine Learning (evilsocket.net)
2 points by evilsocket on May 22, 2019 | past
6.Android Applications Reversing 101 (evilsocket.net)
1 point by evilsocket on April 28, 2017 | past
7.Analysis of multiple vulnerabilities in AirDroid (~50M Android users vulnerable) (zimperium.com)
3 points by evilsocket on Dec 1, 2016 | past | 1 comment
8.Reversing the Smarter Coffee Machine Protocol to Make Coffee Using the Terminal (evilsocket.net)
5 points by evilsocket on Oct 9, 2016 | past | 4 comments
9.WiFi Pentesting with a Pineapple NANO, OS X and BetterCap (evilsocket.net)
3 points by evilsocket on Sept 15, 2016 | past
10.Analysis of multiple vulnerabilities in different open source BTS products (zimperium.com)
3 points by evilsocket on Aug 23, 2016 | past
11.Samsung Galaxy Apps MITM Vulnerabilities (evilsocket.net)
2 points by evilsocket on Aug 17, 2016 | past
12.How the United Arab Emirates Intelligence Tried to Hire Me to Spy on Its People (evilsocket.net)
152 points by evilsocket on July 27, 2016 | past | 73 comments
13.Hacking Yourself Out of the Banking System and Live Only on BitCoin [EPISODE 2] (evilsocket.net)
2 points by evilsocket on May 30, 2016 | past
14.Living Only on Bitcoins (evilsocket.net)
182 points by evilsocket on May 8, 2016 | past | 174 comments
15.Is this a declaration of Cyber War? (evilsocket.net)
3 points by evilsocket on May 2, 2016 | past
16.How I defeated an anti-tamper APK with some Python and a homemade Smali emulator (evilsocket.net)
147 points by evilsocket on April 18, 2016 | past | 75 comments
17.OS X Mass Pwning Using BetterCap and the Sparkle Updater Vulnerability (evilsocket.net)
6 points by evilsocket on Jan 30, 2016 | past
18.Using old GSM encodings to know if a user is Online on the GSM Network (evilsocket.net)
4 points by evilsocket on July 27, 2015 | past
19.The Rise of ZANTI3 – Call for Developers ( OSS ) (zimperium.com)
2 points by evilsocket on July 15, 2015 | past
20.Sniffing GSM Traffic with HackRF (z4ziggy.wordpress.com)
95 points by evilsocket on May 17, 2015 | past | 20 comments
21.SuperFish AdWare found inside X-Notifier browser extension code (evilsocket.net)
1 point by evilsocket on Feb 20, 2015 | past
22.RuberTooth – A complete Ruby porting of the ubertooth libraries and utilities (evilsocket.net)
3 points by evilsocket on Feb 12, 2015 | past
23.Hackers Phishing Leakers: A new BitCoin phishing social technique (evilsocket.net)
1 point by evilsocket on Feb 11, 2015 | past
24.DSploit merges with ZImperium zANTI2 (dsploit.net)
1 point by evilsocket on Nov 3, 2014 | past
25.How TELCOs are bullying researchers, an italian story (evilsocket.net)
2 points by evilsocket on July 15, 2014 | past
26.Gibson cache server now available as ActiveSupport store (gibson-db.in)
1 point by evilsocket on May 11, 2014 | past
27.DSploit Scam and the Guy Who Made Our Small Income Gone Forever (dsploit.net)
145 points by evilsocket on April 28, 2014 | past | 67 comments
28.Identifying and isolating functions inside executables like IDA does. (evilsocket.net)
2 points by evilsocket on March 11, 2014 | past | 1 comment
29.On Windows syscall mechanism and syscall numbers extraction methods (evilsocket.net)
1 point by evilsocket on Feb 11, 2014 | past
30.Gibson: a high efficiency, tree based memory cache server. (gibson-db.in)
1 point by evilsocket on Aug 1, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: