Hacker News
- JTAG 'Hacking' the Original Xbox in 2023 https://blog.ret2.io/2023/08/09/jtag-hacking-the-original-xbox-2023/ 5 comments
- Fuzzing Modern UDP Game Protocols with Snapshot-Based Fuzzers http://blog.ret2.io/2021/07/21/wtf-snapshot-fuzzing/ 14 comments
- Root Cause Analysis of a Non-Deterministic JavaScriptCore Vulnerability http://blog.ret2.io/2018/06/19/pwn2own-2018-root-cause-analysis/ 3 comments
- A Sampling of Anti-Decompilation Techniques https://blog.ret2.io/2017/11/16/dangers-of-the-decompiler/ 32 comments
Lobsters
- pwn2own 2018: Vulnerability Discovery Against Apple Safari https://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/ 3 comments browsers , mac , security
- JTAG 'Hacking' the Original Xbox in 2023 https://blog.ret2.io/2023/08/09/jtag-hacking-the-original-xbox-2023/ 7 comments reverseengineering
- Exploiting Intel Graphics Kernel Extensions on macOS to Escape the Safari Sandbox https://blog.ret2.io/2022/06/29/pwn2own-2021-safari-sandbox-intel-graphics-exploit/ 2 comments netsec
- Ubuntu's Snapcraft Packages Come With Extra Baggage: CVE-2020-27348 https://blog.ret2.io/2021/08/04/snapcraft-injection/ 11 comments linux
- Ubuntu's Snapcraft Packages Come With Extra Baggage: CVE-2020-27348 https://blog.ret2.io/2021/08/04/snapcraft-injection/ 14 comments netsec
- Exploiting a zero-day WebAssembly Vulnerability (CVE-2021-30734) in Apple Safari https://blog.ret2.io/2021/06/02/pwn2own-2021-jsc-exploit/ 7 comments netsec
- Tenet: A Trace Explorer for Reverse Engineers (IDA Pro Plugin) https://blog.ret2.io/2021/04/20/tenet-trace-explorer/ 2 comments reverseengineering
- Lucid: An Interactive Hex-Rays Microcode Explorer for IDA Pro https://blog.ret2.io/2020/09/11/lucid-hexrays-microcode-explorer/ 4 comments reverseengineering
- In Transactional Memory, No One Can Hear You Scream http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ 3 comments lowlevel
- In Transactional Memory, No One Can Hear You Scream: Attacking Intel's Transactional Synchronization Extensions http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ 7 comments netsec
- Gamifiying Binary Exploitation Through Next Generation Wargames https://blog.ret2.io/2018/09/11/scalable-security-education/ 12 comments netsec
- Pwn2Own 2018: A Methodical Approach to Browser Exploitation https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ 6 comments netsec
- Dangers of the Decompiler, A Sampling of Anti-Decompilation Techniques https://blog.ret2.io/2017/11/16/dangers-of-the-decompiler/ 20 comments programming
- Compiling Executables for the Classic POSIX Subsystem on Windows https://blog.ret2.io/2017/09/20/subsystem-posix/ 41 comments programming