Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Octopus-Rex. Evolution of a multi task Botnet
(
thisissecurity.net
)
2 points
by
benkow_
on Oct 28, 2016
|
past
Heap based overflow exploitation use case – The macabre dance of memory chunks
(
thisissecurity.net
)
2 points
by
benkow_
on Sept 19, 2016
|
past
From website-locker to DDoS: Rex
(
thisissecurity.net
)
1 point
by
benkow_
on Aug 17, 2016
|
past
Gamarue loves malicious JavaScript too – A deep look inside a recent campaign
(
thisissecurity.net
)
10 points
by
benkow_
on April 12, 2016
|
past
Let’s ride with TeslaCrypt
(
thisissecurity.net
)
2 points
by
mtalbi
on March 2, 2016
|
past
Hackers do the Haka – Advanced packet and stream manipulation language
(
thisissecurity.net
)
92 points
by
mtalbi
on Nov 24, 2015
|
past
|
11 comments
Why we can execute JavaScript through Rundll32
(
thisissecurity.net
)
9 points
by
fla
on Aug 21, 2014
|
past
|
1 comment
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: