1. | | Recovering “lost” treasure-filled floppy discs with an oscilloscope (scarybeastsecurity.blogspot.com) |
|
306 points by scarybeast on May 17, 2021 | past | 53 comments
|
2. | | The cleverest floppy disc protection ever? Western Security Ltd (scarybeastsecurity.blogspot.com) |
|
339 points by scarybeast on Dec 14, 2020 | past | 130 comments
|
3. | | Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA (scarybeastsecurity.blogspot.com) |
|
169 points by scarybeast on Nov 16, 2020 | past | 39 comments
|
4. | | Turning a £400 BBC Micro (1981) into a $40k disc writer (1987) (scarybeastsecurity.blogspot.com) |
|
34 points by scarybeast on July 10, 2020 | past | 5 comments
|
5. | | Weak bits floppy disc protection: an alternate origins story on 8-bit (scarybeastsecurity.blogspot.com) |
|
65 points by scarybeast on June 27, 2020 | past | 11 comments
|
6. | | A wild bug: 1970s Intel 8271 disc chip ate my data (scarybeastsecurity.blogspot.com) |
|
97 points by scarybeast on June 23, 2020 | past | 19 comments
|
7. | | Sampled sound 1980s style: from SN76489 square waves to samples (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on June 2, 2020 | past
|
8. | | Clocking a 6502 simulator to 15GHz (scarybeastsecurity.blogspot.com) |
|
176 points by scarybeast on April 13, 2020 | past | 74 comments
|
9. | | Dumping Yahoo authentication secrets with an out-of-bounds read (scarybeastsecurity.blogspot.com) |
|
91 points by scarybeast on May 19, 2017 | past | 7 comments
|
10. | | *bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images (scarybeastsecurity.blogspot.com) |
|
4 points by scarybeast on May 19, 2017 | past
|
11. | | Further hardening glibc malloc() against single byte overflows (scarybeastsecurity.blogspot.com) |
|
131 points by scarybeast on May 17, 2017 | past | 35 comments
|
12. | | Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on May 11, 2017 | past
|
13. | | Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty (scarybeastsecurity.blogspot.com) |
|
6 points by scarybeast on May 11, 2017 | past
|
14. | | Ode to the use-after-free: one vulnerable function, a thousand possibilities (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on May 6, 2017 | past
|
15. | | Black box discovery of memory corruption RCE on box.com (scarybeastsecurity.blogspot.com) |
|
2 points by scarybeast on March 30, 2017 | past
|
16. | | Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes? (scarybeastsecurity.blogspot.com) |
|
5 points by scarybeast on Dec 13, 2016 | past
|
17. | | Advancing exploitation: a scriptless 0day exploit against Linux desktops (scarybeastsecurity.blogspot.com) |
|
40 points by scarybeast on Nov 21, 2016 | past
|
18. | | Compromising a Linux desktop using 6502 opcodes on the NES (scarybeastsecurity.blogspot.com) |
|
355 points by scarybeast on Nov 14, 2016 | past | 95 comments
|
19. | | One Perfect Bug: Exploiting Type Confusion in Flash (googleprojectzero.blogspot.com) |
|
11 points by scarybeast on July 20, 2015 | past
|
20. | | Significant Flash exploit mitigations are live in v18.0.0.209 (googleprojectzero.blogspot.com) |
|
90 points by scarybeast on July 16, 2015 | past | 25 comments
|
21. | | From inter to intra: gaining reliability (googleprojectzero.blogspot.com) |
|
8 points by scarybeast on July 10, 2015 | past
|
22. | | What is a “good” memory corruption vulnerability? (googleprojectzero.blogspot.com) |
|
81 points by scarybeast on June 26, 2015 | past | 4 comments
|