TE
TechEcho
Home
24h Top
Newest
Best
Ask
Show
Jobs
English
GitHub
Twitter
Back to Profile
Submissions by adulau
1
A Recommender System based on the analysis of personality traits in Telegram
1 points
by
adulau
over 4 years ago
no comments
2
Tracking Mixed Bitcoins
98 points
by
adulau
over 4 years ago
80 comments
3
Java Cryptography Uses in the Wild
43 points
by
adulau
over 4 years ago
7 comments
4
Off-Path TCP Exploits of the Mixed IPID Assignment
3 points
by
adulau
over 4 years ago
no comments
5
How to organize a hackathon – A planning kit
2 points
by
adulau
almost 5 years ago
no comments
6
Newspipe is a web/RSS news aggregator (self-hosted Python)
4 points
by
adulau
almost 5 years ago
no comments
7
A lightweight dynamic instrumentation library
23 points
by
adulau
almost 5 years ago
3 comments
8
Backstabber's Knife Collection: A Review of Open Source Supply Chain Attacks
121 points
by
adulau
almost 5 years ago
19 comments
9
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
54 points
by
adulau
about 5 years ago
10 comments
10
BaseSAFE: Baseband SAnitized Fuzzing Through Emulation
1 points
by
adulau
about 5 years ago
no comments
11
An Implementation of Tempest in GNU Radio
93 points
by
adulau
about 5 years ago
35 comments
12
Breaking RSA Security with a Low Noise D-Wave 2000Q Quantum Annealer
111 points
by
adulau
about 5 years ago
51 comments
13
Ail framework – Analysis Information Leak framework
1 points
by
adulau
about 5 years ago
no comments
14
CryptoCam: Privacy Conscious Open Circuit Television
36 points
by
adulau
about 5 years ago
7 comments
15
Air-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Vibrations
9 points
by
adulau
about 5 years ago
no comments
16
A “Final” Security Bug
1 points
by
adulau
about 5 years ago
no comments
17
DIY-face-masks (Work In Progress) including fabrics recommendations
2 points
by
adulau
about 5 years ago
no comments
18
An Automated Framework for Board-Level Trojan Benchmarking
1 points
by
adulau
about 5 years ago
no comments
19
Bicycle Attacks: Quantifying the Damage of Widespread Password Length Leakage
30 points
by
adulau
over 5 years ago
50 comments
20
Chain Reactor – framework for composing executables simulate adversary
27 points
by
adulau
over 5 years ago
4 comments
21
GDA – GJoy Dex Analysizer
13 points
by
adulau
over 5 years ago
1 comment
22
Threatbus: connect open-source threat intelligence tools
19 points
by
adulau
over 5 years ago
no comments
23
Threat actors intelligence server and public API
1 points
by
adulau
over 5 years ago
no comments
24
Schemes for Privacy Data Destruction in a NAND Flash Memory
1 points
by
adulau
over 5 years ago
no comments
25
Stroom – a scalable data storage, processing and analysis platform
96 points
by
adulau
over 5 years ago
27 comments
26
General Resolution: Init Systems and Systemd
6 points
by
adulau
over 5 years ago
no comments
27
Joplin – a note taking and to-do application with synchronization capabilities
368 points
by
adulau
over 5 years ago
150 comments
28
Hvaldimir's Story
1 points
by
adulau
over 5 years ago
no comments
29
Finding potential software vulnerabilities from Git commit messages
46 points
by
adulau
over 5 years ago
4 comments
← Previous
Next →