Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Breaking into a Govee Smart Display: From UART Shell to Device Impersonation (kulkan.com)
1 point by rmast 24 days ago | past
MxCheckSec: Validate SPF, DKIM, DMARC, and More (kulkan.com)
3 points by laserspeed 65 days ago | past | 1 comment
See no Evil(ginx) / Detecting and stopping AitM phishing threats (kulkan.com)
1 point by laserspeed 72 days ago | past | 1 comment
Client-Side Path Traversal: Exploiting CSRF in Header-Based Auth Scenarios (kulkan.com)
1 point by laserspeed 6 months ago | past | 1 comment
A PoC using Burp Bambdas to show its simplicity for Quick Wins (kulkan.com)
1 point by laserspeed 9 months ago | past | 1 comment
Bypassing Watermark Implementations (kulkan.com)
37 points by laserspeed 9 months ago | past | 9 comments
Reviewing Penetration Testing Contracts (kulkan.com)
1 point by wslh 9 months ago | past
Reviewing Penetration Testing Contracts (kulkan.com)
1 point by wslh 11 months ago | past
GitXray: A security X-Ray for GitHub repositories (kulkan.com)
3 points by wslh on Jan 23, 2025 | past
Edgar-8k105 tool: analyzing 8-K filings linked to cybersecurity incidents (kulkan.com)
2 points by wslh on Aug 7, 2024 | past
Secure boot and VMware: Automating Kernel module signing (kulkan.com)
1 point by wslh on June 13, 2024 | past
Measuring the Ubuntu patch gap with "Mind the Gap" (kulkan.com)
1 point by wslh on March 13, 2024 | past
The Double-Edged Sword of CRMs: Thoughts on Privacy (kulkan.com)
1 point by wslh on Nov 17, 2023 | past
Security best practices for Google Sheets shared files (kulkan.com)
4 points by wslh on June 8, 2023 | past
Capture the Coins – Bitcoin Challenge Explained (kulkan.com)
14 points by wslh on Aug 11, 2014 | past

Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: