Hacker News new | past | comments | ask | show | jobs | submit | scarybeast's submissions login
1. Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com)
306 points by scarybeast on May 17, 2021 | past | 53 comments
2. The cleverest floppy disc protection ever? Western Security Ltd (scarybeastsecurity.blogspot.com)
339 points by scarybeast on Dec 14, 2020 | past | 130 comments
3. Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com)
169 points by scarybeast on Nov 16, 2020 | past | 39 comments
4. Turning a £400 BBC Micro (1981) into a $40k disc writer (1987) (scarybeastsecurity.blogspot.com)
34 points by scarybeast on July 10, 2020 | past | 5 comments
5. Weak bits floppy disc protection: an alternate origins story on 8-bit (scarybeastsecurity.blogspot.com)
65 points by scarybeast on June 27, 2020 | past | 11 comments
6. A wild bug: 1970s Intel 8271 disc chip ate my data (scarybeastsecurity.blogspot.com)
97 points by scarybeast on June 23, 2020 | past | 19 comments
7. Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com)
2 points by scarybeast on June 2, 2020 | past
8. Clocking a 6502 simulator to 15GHz (scarybeastsecurity.blogspot.com)
176 points by scarybeast on April 13, 2020 | past | 74 comments
9. Dumping Yahoo authentication secrets with an out-of-bounds read (scarybeastsecurity.blogspot.com)
91 points by scarybeast on May 19, 2017 | past | 7 comments
10. *bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images (scarybeastsecurity.blogspot.com)
4 points by scarybeast on May 19, 2017 | past
11. Further hardening glibc malloc() against single byte overflows (scarybeastsecurity.blogspot.com)
131 points by scarybeast on May 17, 2017 | past | 35 comments
12. Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 11, 2017 | past
13. Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty (scarybeastsecurity.blogspot.com)
6 points by scarybeast on May 11, 2017 | past
14. Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com)
2 points by scarybeast on May 6, 2017 | past
15. Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com)
2 points by scarybeast on March 30, 2017 | past
16. Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes? (scarybeastsecurity.blogspot.com)
5 points by scarybeast on Dec 13, 2016 | past
17. Advancing exploitation: a scriptless 0day exploit against Linux desktops (scarybeastsecurity.blogspot.com)
40 points by scarybeast on Nov 21, 2016 | past
18. Compromising a Linux desktop using 6502 opcodes on the NES (scarybeastsecurity.blogspot.com)
355 points by scarybeast on Nov 14, 2016 | past | 95 comments
19. One Perfect Bug: Exploiting Type Confusion in Flash (googleprojectzero.blogspot.com)
11 points by scarybeast on July 20, 2015 | past
20. Significant Flash exploit mitigations are live in v18.0.0.209 (googleprojectzero.blogspot.com)
90 points by scarybeast on July 16, 2015 | past | 25 comments
21. From inter to intra: gaining reliability (googleprojectzero.blogspot.com)
8 points by scarybeast on July 10, 2015 | past
22. What is a “good” memory corruption vulnerability? (googleprojectzero.blogspot.com)
81 points by scarybeast on June 26, 2015 | past | 4 comments

Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: