Hacker News
- An Android 8.0-9.0 Bluetooth Zero-Click RCE https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/ 61 comments
- Critical Bluetooth vulnerability in Android https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/ 300 comments
- What Can Happen in the Course of Vulnerability Disclosure http://www.insinuator.net/2015/09/sending-mixed-signals-what-can-happen-in-the-course-of-vulnerability-disclosure/ 6 comments
- RedStar OS Watermarking http://www.insinuator.net/2015/07/redstar-os-watermarking/ 4 comments
- Analysis of Rails XML Parameter Parsing Vulnerability http://www.insinuator.net/2013/01/rails-yaml/ 2 comments
- Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi https://insinuator.net/2020/11/reversing-c-without-getting-a-heart-attack-devirtualize-virtual-calls-with-devi/ 3 comments reverseengineering
- CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/ 20 comments netsec
- Critical Bluetooth vulnerability in Android https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/ 34 comments programming
- Critical bluetooth vulnerability in Android (CVE 2020-0022) https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/ 8 comments privacy
- Critical Bluetooth Vulnerability in Android (CVE-2020-0022) https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/ 19 comments netsec
- nmap-parse-output: A tool for analyzing Nmap scans https://insinuator.net/2018/08/nmap-parse-output-a-tool-for-analyzing-nmap-scans/ 6 comments netsec
- Git Shell Bypass By Abusing Less https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/ 7 comments netsec
- IoT the S is for Secure – Unknown Administration Interface in Wireless Plug https://insinuator.net/2016/11/iot-the-s-is-for-secure-unknown-administration-interface-in-wireless-plug/ 13 comments netsec
- Linq Injection – From Attacking Filters to Code Execution https://insinuator.net/2016/10/linq-injection-from-attacking-filters-to-code-execution/ 2 comments lowlevel
- How to Become Part of an IoT Botnet https://www.insinuator.net/2016/10/how-to-become-part-of-an-iot-botnet/ 23 comments netsec
- North Korea's Linux OS automatically watermarks docs, images, and audio. Files can be traced back to specific hardware. Possibly stores GPS location. http://www.insinuator.net/2015/07/redstar-os-watermarking/ 7 comments privacy
- RedStar OS Watermarking http://www.insinuator.net/2015/07/redstar-os-watermarking/ 37 comments netsec
- A Novel Way of Abusing IPv6 Extension Headers to Evade IPv6 Security Devices http://www.insinuator.net/2014/05/a-novel-way-of-abusing-ipv6-extension-headers-to-evade-ipv6-security-devices/ 8 comments netsec
- Pytacle – Decrypt GSM Conversations http://www.insinuator.net/2013/10/pytacle-alpha2/ 7 comments netsec
- Excellent analysis of Rails XML Parameter Parsing Vulnerability http://www.insinuator.net/2013/01/rails-yaml/ 5 comments programming
- Attacking Cloud Infrastructures by Malicious VMDK Files http://www.insinuator.net/wp-content/uploads/2012/05/hitb_ams_2012_ernw_vmdk_v1.0_release.pdf 3 comments netsec