Hacker Newsnew | past | comments | ask | show | jobs | submit | evilsocket's submissionslogin
1.Open sourcing Nerve, a tool to instrument LLMs to perform tasks, without code (github.com/evilsocket)
4 points by evilsocket on June 22, 2024 | past | 1 comment
2.Cryptographic failures in RF encryption allow stealing robotic devices (cossacklabs.com)
63 points by evilsocket on June 29, 2022 | past | 17 comments
3.Weaponizing and Gamifying AI for WiFi Hacking: Presenting Pwnagotchi 1.0.0 (evilsocket.net)
3 points by evilsocket on Oct 19, 2019 | past
4.How to Create a Malware Detection System with Machine Learning (evilsocket.net)
2 points by evilsocket on May 22, 2019 | past
5.Android Applications Reversing 101 (evilsocket.net)
1 point by evilsocket on April 28, 2017 | past
6.Analysis of multiple vulnerabilities in AirDroid (~50M Android users vulnerable) (zimperium.com)
3 points by evilsocket on Dec 1, 2016 | past | 1 comment
7.Reversing the Smarter Coffee Machine Protocol to Make Coffee Using the Terminal (evilsocket.net)
5 points by evilsocket on Oct 9, 2016 | past | 4 comments
8.WiFi Pentesting with a Pineapple NANO, OS X and BetterCap (evilsocket.net)
3 points by evilsocket on Sept 15, 2016 | past
9.Analysis of multiple vulnerabilities in different open source BTS products (zimperium.com)
3 points by evilsocket on Aug 23, 2016 | past
10.Samsung Galaxy Apps MITM Vulnerabilities (evilsocket.net)
2 points by evilsocket on Aug 17, 2016 | past
11.How the United Arab Emirates Intelligence Tried to Hire Me to Spy on Its People (evilsocket.net)
152 points by evilsocket on July 27, 2016 | past | 73 comments
12.Hacking Yourself Out of the Banking System and Live Only on BitCoin [EPISODE 2] (evilsocket.net)
2 points by evilsocket on May 30, 2016 | past
13.Living Only on Bitcoins (evilsocket.net)
182 points by evilsocket on May 8, 2016 | past | 174 comments
14.Is this a declaration of Cyber War? (evilsocket.net)
3 points by evilsocket on May 2, 2016 | past
15.How I defeated an anti-tamper APK with some Python and a homemade Smali emulator (evilsocket.net)
147 points by evilsocket on April 18, 2016 | past | 75 comments
16.OS X Mass Pwning Using BetterCap and the Sparkle Updater Vulnerability (evilsocket.net)
6 points by evilsocket on Jan 30, 2016 | past
17.Using old GSM encodings to know if a user is Online on the GSM Network (evilsocket.net)
4 points by evilsocket on July 27, 2015 | past
18.The Rise of ZANTI3 – Call for Developers ( OSS ) (zimperium.com)
2 points by evilsocket on July 15, 2015 | past
19.Sniffing GSM Traffic with HackRF (z4ziggy.wordpress.com)
95 points by evilsocket on May 17, 2015 | past | 20 comments
20.SuperFish AdWare found inside X-Notifier browser extension code (evilsocket.net)
1 point by evilsocket on Feb 20, 2015 | past
21.RuberTooth – A complete Ruby porting of the ubertooth libraries and utilities (evilsocket.net)
3 points by evilsocket on Feb 12, 2015 | past
22.Hackers Phishing Leakers: A new BitCoin phishing social technique (evilsocket.net)
1 point by evilsocket on Feb 11, 2015 | past
23.DSploit merges with ZImperium zANTI2 (dsploit.net)
1 point by evilsocket on Nov 3, 2014 | past
24.How TELCOs are bullying researchers, an italian story (evilsocket.net)
2 points by evilsocket on July 15, 2014 | past
25.Gibson cache server now available as ActiveSupport store (gibson-db.in)
1 point by evilsocket on May 11, 2014 | past
26.DSploit Scam and the Guy Who Made Our Small Income Gone Forever (dsploit.net)
145 points by evilsocket on April 28, 2014 | past | 67 comments
27.Identifying and isolating functions inside executables like IDA does. (evilsocket.net)
2 points by evilsocket on March 11, 2014 | past | 1 comment
28.On Windows syscall mechanism and syscall numbers extraction methods (evilsocket.net)
1 point by evilsocket on Feb 11, 2014 | past
29.Gibson: a high efficiency, tree based memory cache server. (gibson-db.in)
1 point by evilsocket on Aug 1, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: