Hacker News
- Convos: A Persistent Self-Hosted Web Client for IRC https://serhack.me/articles/convos-web-client-persistent-irc/ 2 comments
- Techniques for Setting Up Peripherals via DMA and PIO https://serhack.me/articles/techniques-setting-up-pheripherals-dma-pio/ 2 comments
- Understanding the UBI File System in Embedded Devices https://serhack.me/articles/understanding-ubi-file-system-embedded-devices-reolink/ 2 comments
- Booting an Embedded OS: The Booting and U-Boot Phase https://serhack.me/articles/os-embedded-booting-phase-uboot/ 2 comments
- The Alternative Genesis Block of Bitcoin https://serhack.me/articles/story-behind-alternative-genesis-block-bitcoin/ 98 comments
- Unveiling the anonymous author: Stylometry techniques https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/ 12 comments
- Unpacking ASIC firmware: AntMiner Exploited (2019) https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited/ 14 comments
- Analyzing the Mario Themed Malware https://serhack.me/articles/analyzing-mario-malware-en/ 3 comments
- How to Write a Technical Book https://serhack.me/articles/how-to-write-technical-book/ 8 comments
- A Beginner’s Guide to Getting Started with Bitcoin https://serhack.me/articles/getting-started-with-bitcoin/ 83 comments
- A Beginner’s Guide to Getting Started with Bitcoin https://serhack.me/articles/getting-started-with-bitcoin/ 3 comments
- Hackers can take full control of online compilers through a RCE exploit (2018) https://serhack.me/articles/hackers-full-control-of-online-compilers-through-a-common-exploit/ 15 comments
- Monitoring your own infrastructure using Grafana, InfluxDB, and CollectD https://serhack.me/articles/monitoring-infrastructure-grafana-influxdb-connectd/ 292 comments
Lobsters
- Exploring the Operating System of Reolink RLC-801A https://serhack.me/articles/operating-system-reolink-rlc-810-a/ 3 comments compsci
- Dissecting Reolink RLC-810A Hardware: A Detailed View https://serhack.me/articles/dissecting-reolink-rlc810a-hardware-detailed-view/ 4 comments hardware , reversing
- Booting an Embedded OS: the Booting and U-Boot Phase https://serhack.me/articles/os-embedded-booting-phase-uboot/ 3 comments reversing
- Unveiling the Anonymous Author: Stylometry Techniques https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/ 2 comments privacy
- Analyzing the Mario Themed Malware https://serhack.me/articles/analyzing-mario-malware-en/ 2 comments reversing
- How to Measure Execution Time of a Program https://serhack.me/articles/measure-execution-time-program/ 4 comments compsci
- How to Write a Technical Book https://serhack.me/articles/how-to-write-technical-book/ 3 comments book
- Convos: A Persistent Self-Hosted Web Client for IRC https://serhack.me/articles/convos-web-client-persistent-irc/ 14 comments perl
- Reverse Engineering the OMNIVISION OS12D40 Driver https://serhack.me/articles/reverse-engineering-omnivision-os12d40-driver/ 8 comments reverseengineering
- Booting an Embedded OS: the Booting and U-Boot Phase https://serhack.me/articles/os-embedded-booting-phase-uboot/ 16 comments embedded
- The Story Behind the Alternative Genesis Block of Bitcoin https://serhack.me/articles/story-behind-alternative-genesis-block-bitcoin/ 2 comments bitcoin
- Unveiling the Anonymous Author: Stylometry Techniques https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/ 2 comments privacy
- An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best? https://serhack.me/articles/introduction-cryptocurrency-wallets/ 8 comments cryptocurrency
- Monitoring your own infrastructure using Grafana, InfluxDB, and CollectD https://serhack.me/articles/monitoring-infrastructure-grafana-influxdb-connectd/ 23 comments selfhosted
- MEGA Chrome Extension Hacked - Detailed Timeline of Events - SerHack security engineer https://serhack.me/articles/mega-chrome-extension-hacked 69 comments netsec
- Security report : Hackers can take full control of online compilers through a common exploit https://serhack.me/articles/hackers-full-control-of-online-compilers-through-a-common-exploit 3 comments netsec
- How I broke Envato Search Engine http://serhack.me/articles/how-i-broke-envato-search-field.html 12 comments webdev
- How I broke Envato Search Engine http://serhack.me/articles/how-i-broke-envato-search-field.html 6 comments netsec