| | Reverse engineering a forgotten 1970s Intel dual core beast: 8271 (2020) (scarybeastsecurity.blogspot.com) |
|
115 points by signa11 on Feb 15, 2024 | past | 21 comments
|
| | Recovering "lost" treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com) |
|
3 points by goranmoomin on Nov 7, 2023 | past
|
| | The cleverest floppy disc protection ever? Western Security Ltd. (2020) (scarybeastsecurity.blogspot.com) |
|
2 points by mtmail on Aug 17, 2023 | past
|
| | Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com) |
|
1 point by nixass on May 18, 2021 | past
|
| | Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com) |
|
306 points by scarybeast on May 17, 2021 | past | 53 comments
|
| | Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com) |
|
3 points by diffuse_l on Jan 12, 2021 | past | 1 comment
|
| | The cleverest floppy disc protection ever? Western Security Ltd (scarybeastsecurity.blogspot.com) |
|
339 points by scarybeast on Dec 14, 2020 | past | 130 comments
|
| | Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com) |
|
169 points by scarybeast on Nov 16, 2020 | past | 39 comments
|
| | Turning a £400 BBC Micro (1981) into a $40k disc writer (1987) (scarybeastsecurity.blogspot.com) |
|
34 points by scarybeast on July 10, 2020 | past | 5 comments
|
| | Weak bits floppy disc protection: an alternate origins story on 8-bit (scarybeastsecurity.blogspot.com) |
|
65 points by scarybeast on June 27, 2020 | past | 11 comments
|
| | A wild bug: 1970s Intel 8271 disc chip ate my data (scarybeastsecurity.blogspot.com) |
|
97 points by scarybeast on June 23, 2020 | past | 19 comments
|
| | Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com) |
|
1 point by Luc on June 5, 2020 | past
|
| | Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on June 2, 2020 | past
|
| | Generic cross-browser cross-domain theft (2009) (scarybeastsecurity.blogspot.com) |
|
1 point by networked on May 21, 2020 | past
|
| | Clocking a 6502 simulator to 15GHz (scarybeastsecurity.blogspot.com) |
|
176 points by scarybeast on April 13, 2020 | past | 74 comments
|
| | Introducing Qualys Project Zero? (scarybeastsecurity.blogspot.com) |
|
1 point by dsr12 on June 20, 2017 | past
|
| | Yahoobleed: access other users' private Yahoo! Mail image attachments (scarybeastsecurity.blogspot.com) |
|
11 points by dsr12 on May 20, 2017 | past | 1 comment
|
| | Dumping Yahoo authentication secrets with an out-of-bounds read (scarybeastsecurity.blogspot.com) |
|
91 points by scarybeast on May 19, 2017 | past | 7 comments
|
| | *bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images (scarybeastsecurity.blogspot.com) |
|
4 points by scarybeast on May 19, 2017 | past
|
| | Further hardening glibc malloc() against single byte overflows (scarybeastsecurity.blogspot.com) |
|
131 points by scarybeast on May 17, 2017 | past | 35 comments
|
| | Are we doing memory corruption mitigations wrong? (scarybeastsecurity.blogspot.com) |
|
3 points by mpweiher on May 17, 2017 | past
|
| | Are we doing memory corruption mitigations wrong? (scarybeastsecurity.blogspot.com) |
|
1 point by ingve on May 16, 2017 | past
|
| | Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on May 11, 2017 | past
|
| | Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty (scarybeastsecurity.blogspot.com) |
|
6 points by scarybeast on May 11, 2017 | past
|
| | Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com) |
|
65 points by ingve on May 8, 2017 | past | 25 comments
|
| | Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com) |
|
2 points by el_duderino on May 6, 2017 | past
|
| | Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on May 6, 2017 | past
|
| | Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com) |
|
2 points by jgrahamc on March 30, 2017 | past
|
| | Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on March 30, 2017 | past
|
| | Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes? (scarybeastsecurity.blogspot.com) |
|
2 points by AndreyKarpov on Dec 16, 2016 | past
|
|
|
More |