TE
TechEcho
Home
24h Top
Newest
Best
Ask
Show
Jobs
English
GitHub
Twitter
Back to Profile
Submissions by archimag0
1
Why the Computer Chose Cancun (1972)
1 points
by
archimag0
about 1 year ago
no comments
2
Compromising Honda’s dealer platform through a vulnerable password reset API
1 points
by
archimag0
almost 2 years ago
no comments
3
Vulnerability in TikTok Android app could lead to one-click account hijacking
3 points
by
archimag0
over 2 years ago
no comments
4
Druva InSync for Mac Local Privilege Escalation
1 points
by
archimag0
almost 3 years ago
no comments
5
A story of leaking uninitialized memory from Fastly
3 points
by
archimag0
over 3 years ago
no comments
6
Lessons learned from 15 years of SumatraPDF, an open source Windows app
350 points
by
archimag0
almost 4 years ago
133 comments
7
Stripe Saw Major Uptake of Staff Offer to Move with 10% Pay Cut
33 points
by
archimag0
almost 4 years ago
7 comments
8
I Hacked Google App Engine: Anatomy of a Java Bytecode Exploit
3 points
by
archimag0
about 4 years ago
no comments
9
Attacking the Qualcomm Adreno GPU
63 points
by
archimag0
over 4 years ago
22 comments
10
FF Sandbox Escape (CVE-2020-12388)
3 points
by
archimag0
almost 5 years ago
no comments
11
An EL1/EL3 coldboot vulnerability affecting 7 years of LG Android devices
1 points
by
archimag0
almost 5 years ago
no comments
12
Samsung Android multiple interactionless RCEs
3 points
by
archimag0
about 5 years ago
no comments
13
CryptoHack: A fun platform for learning cryptography
4 points
by
archimag0
about 5 years ago
no comments
14
Mitigations are attack surface, too
104 points
by
archimag0
over 5 years ago
22 comments
15
Several months in the life of Project Zero – Part 1: The Chrome bug of suffering
140 points
by
archimag0
over 5 years ago
27 comments
16
Turn-by-turntables: How drivers got from point A to point B in the early 1900s
81 points
by
archimag0
over 5 years ago
21 comments
17
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
3 points
by
archimag0
over 5 years ago
no comments
18
KTRW: The Journey to Build a Debuggable iPhone
77 points
by
archimag0
over 5 years ago
25 comments
19
Compromising online accounts by cracking voicemail systems
47 points
by
archimag0
almost 6 years ago
9 comments
20
Windows Exploitation Tricks: Abusing the User-Mode Debugger
70 points
by
archimag0
almost 6 years ago
10 comments
21
Windows Exploitation Tricks: Abusing the User-Mode Debugger
3 points
by
archimag0
about 6 years ago
no comments
22
Evilginx2: Standalone man-in-the-middle attack framework
54 points
by
archimag0
over 6 years ago
7 comments
23
Deja-XNU
2 points
by
archimag0
over 6 years ago
no comments
24
Compromising online accounts by cracking voicemail systems
8 points
by
archimag0
over 6 years ago
no comments
25
The Game of Everything, Part 4: Civilization and Geography
2 points
by
archimag0
about 7 years ago
no comments
26
A Few Notes on Medsec and St. Jude Medical
2 points
by
archimag0
over 7 years ago
no comments
27
Can A.I. Be Taught to Explain Itself?
3 points
by
archimag0
over 7 years ago
no comments
28
Exploiting the Wi-Fi Stack on Apple Devices
347 points
by
archimag0
over 7 years ago
83 comments
29
Aes Gcm Speedup
2 points
by
archimag0
over 7 years ago
no comments
← Previous
Next →