| | Breaking into a Govee Smart Display: From UART Shell to Device Impersonation (kulkan.com) |
| 1 point by rmast 24 days ago | past |
|
| | MxCheckSec: Validate SPF, DKIM, DMARC, and More (kulkan.com) |
| 3 points by laserspeed 65 days ago | past | 1 comment |
|
| | See no Evil(ginx) / Detecting and stopping AitM phishing threats (kulkan.com) |
| 1 point by laserspeed 72 days ago | past | 1 comment |
|
| | Client-Side Path Traversal: Exploiting CSRF in Header-Based Auth Scenarios (kulkan.com) |
| 1 point by laserspeed 6 months ago | past | 1 comment |
|
| | A PoC using Burp Bambdas to show its simplicity for Quick Wins (kulkan.com) |
| 1 point by laserspeed 9 months ago | past | 1 comment |
|
| | Bypassing Watermark Implementations (kulkan.com) |
| 37 points by laserspeed 9 months ago | past | 9 comments |
|
| | Reviewing Penetration Testing Contracts (kulkan.com) |
| 1 point by wslh 9 months ago | past |
|
| | Reviewing Penetration Testing Contracts (kulkan.com) |
| 1 point by wslh 11 months ago | past |
|
| | GitXray: A security X-Ray for GitHub repositories (kulkan.com) |
| 3 points by wslh on Jan 23, 2025 | past |
|
| | Edgar-8k105 tool: analyzing 8-K filings linked to cybersecurity incidents (kulkan.com) |
| 2 points by wslh on Aug 7, 2024 | past |
|
| | Secure boot and VMware: Automating Kernel module signing (kulkan.com) |
| 1 point by wslh on June 13, 2024 | past |
|
| | Measuring the Ubuntu patch gap with "Mind the Gap" (kulkan.com) |
| 1 point by wslh on March 13, 2024 | past |
|
| | The Double-Edged Sword of CRMs: Thoughts on Privacy (kulkan.com) |
| 1 point by wslh on Nov 17, 2023 | past |
|
| | Security best practices for Google Sheets shared files (kulkan.com) |
| 4 points by wslh on June 8, 2023 | past |
|
| | Capture the Coins – Bitcoin Challenge Explained (kulkan.com) |
| 14 points by wslh on Aug 11, 2014 | past |
|