Hacker Newsnew | past | comments | ask | show | jobs | submit | scarybeast's submissionslogin
1.Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com)
306 points by scarybeast on May 17, 2021 | past | 53 comments
2.The cleverest floppy disc protection ever? Western Security Ltd (scarybeastsecurity.blogspot.com)
339 points by scarybeast on Dec 14, 2020 | past | 130 comments
3.Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com)
169 points by scarybeast on Nov 16, 2020 | past | 39 comments
4.Turning a £400 BBC Micro (1981) into a $40k disc writer (1987) (scarybeastsecurity.blogspot.com)
34 points by scarybeast on July 10, 2020 | past | 5 comments
5.Weak bits floppy disc protection: an alternate origins story on 8-bit (scarybeastsecurity.blogspot.com)
65 points by scarybeast on June 27, 2020 | past | 11 comments
6.A wild bug: 1970s Intel 8271 disc chip ate my data (scarybeastsecurity.blogspot.com)
97 points by scarybeast on June 23, 2020 | past | 19 comments
7.Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com)
2 points by scarybeast on June 2, 2020 | past
8.Clocking a 6502 simulator to 15GHz (scarybeastsecurity.blogspot.com)
176 points by scarybeast on April 13, 2020 | past | 74 comments
9.Dumping Yahoo authentication secrets with an out-of-bounds read (scarybeastsecurity.blogspot.com)
91 points by scarybeast on May 19, 2017 | past | 7 comments
10.*bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images (scarybeastsecurity.blogspot.com)
4 points by scarybeast on May 19, 2017 | past
11.Further hardening glibc malloc() against single byte overflows (scarybeastsecurity.blogspot.com)
131 points by scarybeast on May 17, 2017 | past | 35 comments
12.Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 11, 2017 | past
13.Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty (scarybeastsecurity.blogspot.com)
6 points by scarybeast on May 11, 2017 | past
14.Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 6, 2017 | past
15.Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com)
2 points by scarybeast on March 30, 2017 | past
16.Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes? (scarybeastsecurity.blogspot.com)
5 points by scarybeast on Dec 13, 2016 | past
17.Advancing exploitation: a scriptless 0day exploit against Linux desktops (scarybeastsecurity.blogspot.com)
40 points by scarybeast on Nov 21, 2016 | past
18.Compromising a Linux desktop using 6502 opcodes on the NES (scarybeastsecurity.blogspot.com)
355 points by scarybeast on Nov 14, 2016 | past | 95 comments
19.One Perfect Bug: Exploiting Type Confusion in Flash (googleprojectzero.blogspot.com)
11 points by scarybeast on July 20, 2015 | past
20.Significant Flash exploit mitigations are live in v18.0.0.209 (googleprojectzero.blogspot.com)
90 points by scarybeast on July 16, 2015 | past | 25 comments
21.From inter to intra: gaining reliability (googleprojectzero.blogspot.com)
8 points by scarybeast on July 10, 2015 | past
22.What is a “good” memory corruption vulnerability? (googleprojectzero.blogspot.com)
81 points by scarybeast on June 26, 2015 | past | 4 comments

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: