Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
The Guest Who Could: Exploiting LPE in VMware Tools (ptsecurity.com)
3 points by uponasmile 4 months ago | past
Exploiting a 20 years old NTFS Vulnerability (ptsecurity.com)
15 points by giuliomagnifico 5 months ago | past
Xbox 360 security in details: the long way to RGH3 (ptsecurity.com)
10 points by monoau 10 months ago | past | 1 comment
New dog, old trick: DaMAgeCard attack targets memory directly via SD card reader (ptsecurity.com)
187 points by thebeardisred on Dec 9, 2024 | past | 21 comments
DaMAgeCard attack targets memory directly thru SD card reader (ptsecurity.com)
2 points by todsacerdoti on Dec 6, 2024 | past
How APT groups operate in Southeast Asia (ptsecurity.com)
3 points by g147 on July 30, 2024 | past
Getting XXE in Web Browsers Using ChatGPT (ptsecurity.com)
1 point by albinowax_ on May 22, 2024 | past
Source Code Disclosure in Asp.net via Cookieless Sessions (ptsecurity.com)
1 point by albinowax_ on March 7, 2024 | past
Dark River. You can't see them, but they're there (ptsecurity.com)
1 point by campuscodi on Sept 28, 2023 | past
Discovering Domains via a Time-Correlation Attack (ptsecurity.com)
2 points by sysadm1n on Sept 2, 2022 | past | 1 comment
Discovering Domains via a Time-Correlation Attack on Certificate Transparency (ptsecurity.com)
2 points by tomwas54 on Sept 1, 2022 | past
Discovering Domains via a Timing Attack on Certificate Transparency (ptsecurity.com)
1 point by rmdoss on Aug 13, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
1 point by westi on Aug 10, 2022 | past
Discovering Domains via a Timing Attack on Certificate Transparency (ptsecurity.com)
2 points by ghuntley on Aug 10, 2022 | past
Researching Open Source Apps for XSS to RCE Flaws (ptsecurity.com)
1 point by detaro on Aug 6, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
1 point by gravitate on July 16, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
3 points by wrayjustin on July 15, 2022 | past | 1 comment
A Kernel Hacker Meets Fuchsia OS (ptsecurity.com)
2 points by LaSombra on May 26, 2022 | past
Fuzzing for XSS via nested parsers condition (ptsecurity.com)
3 points by rrampage on Feb 10, 2022 | past
WinRAR’s vulnerable trialware: when free software isn’t free (ptsecurity.com)
1 point by Sami_Lehtinen on Oct 20, 2021 | past | 2 comments
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
2 points by azalemeth on Oct 6, 2021 | past
Guide to P-code Injection: Changing the intermediate representation of code on (ptsecurity.com)
2 points by todsacerdoti on June 3, 2021 | past
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
1 point by lazyjeff on May 15, 2021 | past
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
2 points by todsacerdoti on May 13, 2021 | past
Positive Technologies' official statement following U.S. sanctions (ptsecurity.com)
3 points by f311a on April 17, 2021 | past
Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel (ptsecurity.com)
1 point by g0xA52A2A on April 13, 2021 | past
Unauthorized RCE in VMware VCenter (ptsecurity.com)
2 points by notmine1337 on Feb 25, 2021 | past
Unauthorized RCE in VMware VCenter (ptsecurity.com)
13 points by pedro84 on Feb 24, 2021 | past | 1 comment
Vulnerabilities in PAN-OS could threaten internal networks security (ptsecurity.com)
1 point by sizzle on Sept 23, 2020 | past
Intel x86 root of trust:loss of trust (ptsecurity.com)
2 points by tejohnso on March 7, 2020 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: