Skip to content

Instantly share code, notes, and snippets.

@breadchris
Created March 3, 2020 07:02
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save breadchris/525a33a376565cc85595dda435abab38 to your computer and use it in GitHub Desktop.
Save breadchris/525a33a376565cc85595dda435abab38 to your computer and use it in GitHub Desktop.
pocket backup
<!DOCTYPE html>
<html>
<!--So long and thanks for all the fish-->
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<title>Pocket Export</title>
</head>
<body>
<h1>Unread</h1>
<ul>
<li><a href="https://www.indiehackers.com/post/how-to-brainstorm-great-business-ideas-ab51c3d51c" time_added="1582932826" tags="">How to brainstorm great business ideas</a></li>
<li><a href="https://www.linaro.org/blog/the-end-of-an-era/" time_added="1581190102" tags="">The end of an Era - Linaro</a></li>
<li><a href="https://joellaity.com/2020/01/31/string.html" time_added="1580758640" tags="">libc ’s implementation of std::string | Joel Laity</a></li>
<li><a href="https://www.vitoliuzzi.com/app/download/7856258261/the_best_of_victor_wooten.pdf?t=1557927056" time_added="1579813434" tags="">https://www.vitoliuzzi.com/app/download/7856258261/the_best_of_victor_wooten.pdf?t=1557927056</a></li>
<li><a href="https://www.notreble.com/buzz/2015/08/20/bass-transcription-joe-darts-bass-line-on-vulfpecks-beastly/" time_added="1579734799" tags="">Bass Transcription: Joe Dart’s Bass Line on Vulfpeck’s “Beastly” – No Trebl</a></li>
<li><a href="https://www.simform.com/serverless-examples-aws-lambda-use-cases/" time_added="1579301118" tags="aws,lambda">10 AWS Lambda Use Cases to Start Your Serverless Journey</a></li>
<li><a href="https://blog.cryptographyengineering.com/" time_added="1579224861" tags="">A Few Thoughts on Cryptographic Engineering – Some random thoughts about cr</a></li>
<li><a href="https://www.thekitchn.com/costco-meal-plan-265010" time_added="1579045313" tags="">How I Prep Two Weeks&#039; Worth of Costco Meals | Kitchn</a></li>
<li><a href="https://queue.acm.org/detail.cfm?id=3375635" time_added="1577069512" tags="">https://queue.acm.org/detail.cfm?id=3375635</a></li>
<li><a href="https://www.beyondlogic.org/usbnutshell/usb1.shtml" time_added="1576430759" tags="">article-mobile.html</a></li>
<li><a href="https://goelhardik.github.io/2016/10/04/fishers-lda/" time_added="1576274218" tags="">Implementing Fisher’s LDA from scratch in Python · Hardik Goel</a></li>
<li><a href="https://goelhardik.github.io/2017/02/15/extracting-data-from-hackernews/" time_added="1576274212" tags="">Extracting data from HackerNews using Firebase API in Python · Hardik Goel</a></li>
<li><a href="https://arxiv.org/pdf/1809.01771.pdf" time_added="1576260238" tags="">1809.01771.pdf</a></li>
<li><a href="https://www.thinkinfi.com/2019/08/LDA-Gensim-Python.html" time_added="1576258807" tags="">Guide to Build Best LDA model using Gensim Python - Think Infi</a></li>
<li><a href="https://stackabuse.com/implementing-lda-in-python-with-scikit-learn/" time_added="1576258804" tags="">Implementing LDA in Python with Scikit-Learn</a></li>
<li><a href="http://ericvh.github.io/9p-rfc/rfc9p2000.html" time_added="1575657054" tags="">Plan 9 Remote Resource Protocol</a></li>
<li><a href="http://www.unofficialgoogledatascience.com/2016/10/practical-advice-for-analysis-of-large.html" time_added="1574918450" tags="">article-mobile.html</a></li>
<li><a href="https://www.youtube.com/watch?v=NmpnGhRwsu0" time_added="1574396723" tags="">article-mobile.html</a></li>
<li><a href="https://www.nylas.com/blog/packaging-deploying-python/" time_added="1574296899" tags="">How We Deploy Python Code | Nylas</a></li>
<li><a href="https://travisdowns.github.io/blog/2019/11/19/toupper.html" time_added="1574275342" tags="">Clang-format tanks performance | Performance Matters</a></li>
<li><a href="https://www.fullstackpython.com/" time_added="1574126892" tags="">Full Stack Python</a></li>
<li><a href="https://pomb.us/build-your-own-react/" time_added="1573758085" tags="">Build your own React</a></li>
<li><a href="https://medium.com/@oyewusiwuraola/exploring-topic-modelling-with-gensim-on-the-essential-science-indicators-journals-list-1dc4d9f96d9c" time_added="1573527665" tags="">Exploring Topic Modelling with Gensim on the Essential Science Indicators J</a></li>
<li><a href="https://ethz.ch/content/dam/ethz/special-interest/infk/chair-program-method/pm/documents/Education/Theses/Flurin_Rindisbacher_MA_report.pdf" time_added="1573506192" tags="">Flurin_Rindisbacher_MA_report.pdf</a></li>
<li><a href="https://courses.cs.washington.edu/courses/cse501/15sp/" time_added="1573506058" tags="">CSE 501: Principles and Applications of Program Analysis</a></li>
<li><a href="https://tel.archives-ouvertes.fr/tel-01769981/document" time_added="1573505890" tags="">Static analysis by abstract interpretation of functional temporal propertie</a></li>
<li><a href="http://www-verimag.imag.fr/PUBLIS/uploads/ipogm3582.pdf" time_added="1573505726" tags="">ipogm3582.pdf</a></li>
<li><a href="https://www.msreverseengineering.com/blog/2018/2/26/concrete-and-abstract-interpretation-explained-through-chess" time_added="1573505537" tags="">Concrete and Abstract Interpretation, Explained through Chess — Möbius Stri</a></li>
<li><a href="http://web.mit.edu/afs/athena.mit.edu/course/16/16.399/www/" time_added="1573505408" tags="">MIT Course 16.399: « Abstract Interpretation » Home Page</a></li>
<li><a href="https://xiph.org/video/vid1.shtml" time_added="1573354052" tags="">Xiph.Org Video Presentations: A Digital Media Primer for Geeks</a></li>
<li><a href="https://www.cs.tau.ac.il/~msagiv/courses/software-productivity.html" time_added="1573166847" tags="">https://www.cs.tau.ac.il/~msagiv/courses/software-productivity.html</a></li>
<li><a href="https://www.cs.tau.ac.il/~msagiv/courses/pa16.html#examples" time_added="1573166770" tags="">https://www.cs.tau.ac.il/~msagiv/courses/pa16.html#examples</a></li>
<li><a href="https://www.cs.tau.ac.il/~msagiv/" time_added="1573166656" tags="">Mooly (Shmuel) Sagiv</a></li>
<li><a href="http://ropas.snu.ac.kr/~kwang/talk/ssft19.pdf" time_added="1573165967" tags="">ssft19.pdf</a></li>
<li><a href="https://homepage.cs.uiowa.edu/~tinelli/classes/seminar/Cousot--A%20Tutorial%20on%20AI.pdf" time_added="1573165870" tags="">A Tutorial on Abstract Interpretation</a></li>
<li><a href="https://towardsdatascience.com/how-exactly-umap-works-13e3040e1668" time_added="1573156480" tags="">How Exactly UMAP Works - Towards Data Science</a></li>
<li><a href="https://noduslabs.com/cases/tutorial-lda-text-mining-network-analysis/" time_added="1573154460" tags="">Tutorial: Text Mining Using LDA and Network Analysis | Nodus Labs</a></li>
<li><a href="https://towardsdatascience.com/beyond-word-embeddings-part-2-word-vectors-nlp-modeling-from-bow-to-bert-4ebd4711d0ec" time_added="1573094497" tags="">Beyond Word Embeddings Part 2 - Towards Data Science</a></li>
<li><a href="https://research.swtch.com/gorace" time_added="1573004364" tags="">research!rsc: Off to the Races</a></li>
<li><a href="https://bytes.grubhub.com/search-query-embeddings-using-query2vec-f5931df27d79" time_added="1572999547" tags="">Query2vec: Search query expansion with query embeddings</a></li>
<li><a href="http://www.jacobsilterra.com/2017/12/11/classifying-and-clustering-with-fasttext/" time_added="1572893154" tags="">Classifying and visualizing with fastText and tSNE | Jacob Silterra</a></li>
<li><a href="http://nlpx.net/archives/330" time_added="1572814863" tags="">A tale about LDA2vec: when LDA meets word2vec - NLPx</a></li>
<li><a href="https://towardsdatascience.com/text2image-a-new-way-to-nlp-cbf63376aa0d" time_added="1572722586" tags="">Text2Image: A new way to NLP? - Towards Data Science</a></li>
<li><a href="http://developer.squareup.com/blog/inferring-label-hierarchies-with-hlda" time_added="1572649532" tags="">Inferring Label Hierarchies with hLDA | Square Corner Blog</a></li>
<li><a href="https://multithreaded.stitchfix.com/blog/2016/05/27/lda2vec/" time_added="1572648748" tags="">Introducing our Hybrid lda2vec Algorithm | Stitch Fix Technology – Multithr</a></li>
<li><a href="http://mccormickml.com/2016/04/19/word2vec-tutorial-the-skip-gram-model/" time_added="1572645472" tags="">Word2Vec Tutorial - The Skip-Gram Model · Chris McCormick</a></li>
<li><a href="https://medium.com/nanonets/topic-modeling-with-lsa-psla-lda-and-lda2vec-555ff65b0b05" time_added="1572570305" tags="">Topic Modeling with LSA, PLSA, LDA &amp; lda2Vec - NanoNets - Medium</a></li>
<li><a href="https://markroxor.github.io/gensim/static/notebooks/gensim_news_classification.html" time_added="1572569757" tags="">gensim_news_classification</a></li>
<li><a href="https://radimrehurek.com/gensim/models/hdpmodel.html" time_added="1572567674" tags="">gensim: models.hdpmodel – Hierarchical Dirichlet Process</a></li>
<li><a href="https://aws.amazon.com/blogs/machine-learning/enhanced-text-classification-and-word-vectors-using-amazon-sagemaker-blazingtext/" time_added="1572567428" tags="">Enhanced text classification and word vectors using Amazon SageMaker Blazin</a></li>
<li><a href="https://realpython.com/python-keras-text-classification/" time_added="1572567283" tags="">Practical Text Classification With Python and Keras – Real Python</a></li>
<li><a href="https://medium.com/towards-artificial-intelligence/multi-class-text-classification-using-pyspark-mllib-doc2vec-dbfcee5b39f2" time_added="1572567267" tags="">Multi-Class Text Classification Using PySpark, MLlib &amp; Doc2Vec</a></li>
<li><a href="https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/" time_added="1572556890" tags="">Creating an LLVM Sanitizer from Hopes and Dreams | Trail of Bits Blog</a></li>
<li><a href="https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers" time_added="1572551005" tags="">Abusing HTTP hop-by-hop request headers - My Blog</a></li>
<li><a href="https://rare-technologies.com/implementing-poincare-embeddings/" time_added="1572545742" tags="">Implementing Poincaré Embeddings | RARE Technologies</a></li>
<li><a href="https://nbviewer.jupyter.org/github/RaRe-Technologies/gensim/blob/develop/docs/notebooks/Poincare%20Tutorial.ipynb" time_added="1572545703" tags="">Jupyter Notebook Viewer</a></li>
<li><a href="https://nickcdryan.com/2017/01/23/multi-label-classification-a-guided-tour/" time_added="1572479976" tags="">Multi-label Classification: A Guided Tour – Nick Ryan</a></li>
<li><a href="https://fzr72725.github.io/2018/01/14/genism-guide.html" time_added="1572479722" tags="">My Pipeline of Text Classification Using Gensim’s Doc2Vec and Logistic Regr</a></li>
<li><a href="https://www.kdnuggets.com/2018/03/hierarchical-classification.html" time_added="1572479045" tags="">Hierarchical Classification – a useful approach for predicting thousands of</a></li>
<li><a href="https://www.aclweb.org/anthology/P19-3015.pdf" time_added="1572478431" tags="">NeuralClassifier: An Open-source Neural Hierarchical Multi-label Text Class</a></li>
<li><a href="https://davidallenfox.wordpress.com/2017/11/01/hierarchical-multi-label-classification-of-news-content/" time_added="1572478292" tags="">Hierarchical multi-label classification of news content using machine learn</a></li>
<li><a href="https://towardsdatascience.com/https-medium-com-noa-weiss-the-hitchhikers-guide-to-hierarchical-classification-f8428ea1e076" time_added="1572477430" tags="">The Hitchhiker’s Guide to Hierarchical Classification</a></li>
<li><a href="http://retrobits.net/atari/sam.shtml" time_added="1572465591" tags="">S.A.M. -- The Software Automatic Mouth</a></li>
<li><a href="https://medium.com/@donhopkins/the-story-of-sun-microsystems-pizzatool-2a7992b4c797" time_added="1572462513" tags="">The Story of Sun Microsystems PizzaTool - Don Hopkins - Medium</a></li>
<li><a href="https://ahmedbesbes.com/how-to-mine-newsfeed-data-and-extract-interactive-insights-in-python.html" time_added="1572406956" tags="">Ahmed BESBES - Data Science Portfolio – How to mine newsfeed data and extra</a></li>
<li><a href="https://www.analyticsvidhya.com/blog/2018/02/the-different-methods-deal-text-data-predictive-python/" time_added="1572406699" tags="">Ultimate guide to deal with Text Data (using Python) - for Data Scientists </a></li>
<li><a href="https://docs.microsoft.com/en-us/azure/architecture/best-practices/api-design" time_added="1572313471" tags="">API design guidance - Best practices for cloud applications | Microsoft Doc</a></li>
<li><a href="https://hackernoon.com/restful-api-designing-guidelines-the-best-practices-60e1d954e7c9" time_added="1572313449" tags="">RESTful API Designing guidelines — The best practices - By</a></li>
<li><a href="https://codepen.io/H2xDev/pen/QeMwjo" time_added="1572299160" tags="">Flying through Web</a></li>
<li><a href="https://jlorince.github.io/viz-tutorial/" time_added="1572247849" tags="">A simple tutorial for visualization of large, high-dimensional data – Jared</a></li>
<li><a href="https://innashteinbuk.com/doc2vec-gizmodo/" time_added="1572247846" tags="">Doc2vec with Gizmodo articles | Inna Shteinbuk</a></li>
<li><a href="https://medium.com/@morga046/multi-class-text-classification-with-doc2vec-and-t-sne-a-full-tutorial-55eb24fc40d3" time_added="1572234933" tags="">Multi-Class Text Classification with Doc2Vec and t-SNE, a full tutorial.</a></li>
<li><a href="https://towardsdatascience.com/multi-class-text-classification-with-doc2vec-logistic-regression-9da9947b43f4" time_added="1572234903" tags="">Multi-Class Text Classification with Doc2Vec &amp; Logistic Regression</a></li>
<li><a href="https://towardsdatascience.com/word2vec-from-scratch-with-numpy-8786ddd49e72" time_added="1572234572" tags="">Word2vec from Scratch with NumPy - Towards Data Science</a></li>
<li><a href="https://habr.com/en/company/dsec/blog/472762/" time_added="1571970960" tags="">Technical analysis of the checkm8 exploit / Habr</a></li>
<li><a href="https://towardsdatascience.com/facebook-research-just-published-an-awesome-paper-on-learning-hierarchical-representations-34e3d829ede7" time_added="1571886927" tags="">Facebook Research just published an awesome paper on learning hierarchical </a></li>
<li><a href="https://aws.amazon.com/blogs/machine-learning/how-to-deploy-deep-learning-models-with-aws-lambda-and-tensorflow/" time_added="1571866055" tags="">https://aws.amazon.com/blogs/machine-learning/how-to-deploy-deep-learning-models-with-aws-lambda-and-tensorflow/</a></li>
<li><a href="https://medium.com/scaleabout/a-gentle-introduction-to-doc2vec-db3e8c0cce5e" time_added="1571863571" tags="">A gentle introduction to Doc2Vec - ScaleAbout - Medium</a></li>
<li><a href="https://arxiv.org/abs/1405.4053" time_added="1571862990" tags="">[1405.4053] Distributed Representations of Sentences and Documents</a></li>
<li><a href="https://blog.xkcd.com/2010/05/03/color-survey-results/" time_added="1571634628" tags="">Color Survey Results – xkcd</a></li>
<li><a href="http://www.uco.es/users/ma1fegan/Comunes/asignaturas/vision/Encyclopedia-of-distances-2009.pdf" time_added="1571634555" tags="">Encyclopedia-of-distances-2009.pdf</a></li>
<li><a href="https://gist.github.com/aparrish/2f562e3737544cf29aaf1af30362f469" time_added="1571632331" tags="">Understanding word vectors: A tutorial for &quot;Reading and Writing Electronic </a></li>
<li><a href="https://hernan.de/blog/2019/10/15/tailoring-cve-2019-2215-to-achieve-root/" time_added="1571240270" tags="">Grant H. - Tailoring CVE-2019-2215 to Achieve Root</a></li>
<li><a href="https://blog.francium.tech/content-based-text-classification-with-doc2vec-and-tensorflow-efd1dd4f02a8" time_added="1570943482" tags="">Content Based Text Classification with Doc2Vec and TensorFlow</a></li>
<li><a href="http://distill.pub/" time_added="1570855312" tags="">Distill — Latest articles about machine learning</a></li>
<li><a href="https://www.youtube.com/playlist?list=PLZHQObOWTQDNU6R1_67000Dx_ZCJB-3pi" time_added="1570855164" tags="">Watch &quot;Neural networks&quot; on YouTube</a></li>
<li><a href="http://colah.github.io/posts/2014-07-NLP-RNNs-Representations/" time_added="1570851676" tags="">Deep Learning, NLP, and Representations - colah&#039;s blog</a></li>
<li><a href="https://medium.com/@r00__/decoding-a-broken-qr-code-39fc3473a034" time_added="1570824385" tags="">Decoding a Broken QR Code - .r00 - Medium</a></li>
<li><a href="https://adventuresinmachinelearning.com/neural-networks-tutorial/" time_added="1570512777" tags="">Neural Networks Tutorial - A Pathway to Deep Learning - Adventures in Machi</a></li>
<li><a href="https://adventuresinmachinelearning.com/stochastic-gradient-descent/" time_added="1570512766" tags="">Stochastic Gradient Descent - Mini-batch and more - Adventures in Machine L</a></li>
<li><a href="https://blog.medium.com/what-are-bloom-filters-1ec2a50c68ff" time_added="1570141102" tags="">What are Bloom filters? - 3 min read</a></li>
<li><a href="https://lineageos.org/engineering/Qualcomm-Firmware/" time_added="1569774308" tags="">https://lineageos.org/engineering/Qualcomm-Firmware/</a></li>
<li><a href="https://medium.com/@david.richard.holtz/text-analysis-in-2019-finding-similar-badges-9b7486b4c56c" time_added="1569523657" tags="">Text Analysis in 2019 — Finding similar badges - David Richard Holtz - Medi</a></li>
<li><a href="https://getpocket.com/explore/item/here-s-why-time-off-work-actually-improves-your-work-and-life" time_added="1569515784" tags="">https://getpocket.com/explore/item/here-s-why-time-off-work-actually-improves-your-work-and-life</a></li>
<li><a href="https://www.tensorflow.org/tutorials/representation/word2vec" time_added="1569483407" tags="">https://www.tensorflow.org/tutorials/representation/word2vec</a></li>
<li><a href="http://people.seas.harvard.edu/~srush/emnlp2015_slides.pdf" time_added="1569435739" tags="">A Neural Attention Model for Abstractive Sentence Summarization</a></li>
<li><a href="https://pytorch.org/tutorials/intermediate/char_rnn_classification_tutorial.html" time_added="1569435731" tags="">NLP From Scratch: Classifying Names with a Character-Level RNN — PyTorch Tu</a></li>
<li><a href="https://datascience.stackexchange.com/questions/10077/keyword-phrase-extraction-from-text-using-deep-learning-libraries" time_added="1569435529" tags="">neural network - Keyword/phrase extraction from Text using Deep Learning li</a></li>
<li><a href="https://www.nltk.org/book/" time_added="1569435332" tags="">NLTK Book</a></li>
<li><a href="https://medium.com/jatana/unsupervised-text-summarization-using-sentence-embeddings-adb15ce83db1" time_added="1569433881" tags="">Unsupervised Text Summarization using Sentence Embeddings</a></li>
<li><a href="https://ferrous-systems.com/blog/lock-free-ring-buffer/" time_added="1569200827" tags="">The design and implementation of a lock-free ring-buffer with contiguous re</a></li>
<li><a href="https://stackoverflow.blog/2019/09/17/joel-spolsky-clive-thompson-discuss-coders-software-programming/" time_added="1568999329" tags="">https://stackoverflow.blog/2019/09/17/joel-spolsky-clive-thompson-discuss-coders-software-programming/</a></li>
<li><a href="https://getpocket.com/explore/item/burnout-runs-deeper-than-too-much-work" time_added="1568999306" tags="">https://getpocket.com/explore/item/burnout-runs-deeper-than-too-much-work</a></li>
<li><a href="https://elemental.medium.com/bring-back-handwriting-its-good-for-your-brain-fe22fe6c81d2" time_added="1568824932" tags="">https://elemental.medium.com/bring-back-handwriting-its-good-for-your-brain-fe22fe6c81d2</a></li>
<li><a href="https://lwn.net/Articles/798230/" time_added="1568662903" tags="">https://lwn.net/Articles/798230/</a></li>
<li><a href="https://blog.quarkslab.com/weisfeiler-lehman-graph-kernel-for-binary-function-analysis.html" time_added="1568056630" tags="">Weisfeiler-Lehman Graph Kernel for Binary Function Analysis</a></li>
<li><a href="https://github.com/kamranahmedse/developer-roadmap" time_added="1567663156" tags="">kamranahmedse/developer-roadmap: Roadmap to becoming a web developer in 201</a></li>
<li><a href="https://medium.com/@kulor/creating-an-offline-first-react-native-app-5534d7794969" time_added="1567551574" tags="">Creating an offline-first React Native app - James Broad - Medium</a></li>
<li><a href="https://technology.riotgames.com/news/random-acts-optimization" time_added="1567192506" tags="">Random Acts of Optimization | Riot Games Technology</a></li>
<li><a href="https://blog.regehr.org/archives/1603" time_added="1567192496" tags="">How LLVM Optimizes a Function – Embedded in Academia</a></li>
<li><a href="https://getpocket.com/explore/item/the-problem-with-hack-culture" time_added="1567032148" tags="">https://getpocket.com/explore/item/the-problem-with-hack-culture</a></li>
<li><a href="https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html?m=1" time_added="1566576989" tags="">https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html?m=1</a></li>
<li><a href="https://bke.ro/working-wwan-on-the-x1-carbon-gen-6/" time_added="1566275160" tags="">Working WWAN on the X1 Carbon Gen 6 – Bke.ro</a></li>
<li><a href="https://theartofmachinery.com/2019/08/12/c_const_isnt_for_performance.html" time_added="1566253319" tags="">Why const Doesn&#039;t Make C Code Faster — The Art of Machinery</a></li>
<li><a href="https://awesomekling.github.io/Serenity-C++-patterns-NetworkOrdered/" time_added="1566010825" tags="">Serenity C patterns: NetworkOrdered – Andreas Kling – I like computers!</a></li>
<li><a href="https://blog.exodusintel.com/2017/07/26/broadpwn/" time_added="1565284985" tags="">Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom&#039;s Wi-</a></li>
<li><a href="https://www.youtube.com/watch?v=-RT5sQZ-ckY" time_added="1564683601" tags="">https://www.youtube.com/watch?v=-RT5sQZ-ckY</a></li>
<li><a href="http://www.cs.yale.edu/homes/hudak/Papers/HSoM.pdf" time_added="1564429657" tags="haskell,music">19_3.eps</a></li>
<li><a href="https://blog.stalkr.net/2015/04/golang-data-races-to-break-memory-safety.html?m=1" time_added="1564257357" tags="">https://blog.stalkr.net/2015/04/golang-data-races-to-break-memory-safety.html?m=1</a></li>
<li><a href="https://m-cacm.acm.org/magazines/2019/8/238344-scaling-static-analyses-at-facebook/fulltext" time_added="1564073086" tags="">https://m-cacm.acm.org/magazines/2019/8/238344-scaling-static-analyses-at-facebook/fulltext</a></li>
<li><a href="http://matt.might.net/papers/vanhorn2010abstract.pdf" time_added="1564072658" tags="">http://matt.might.net/papers/vanhorn2010abstract.pdf</a></li>
<li><a href="https://docs.imandra.ai/imandra-docs/notebooks/reasonml-facetime-state-machines/" time_added="1564030186" tags="">Imandra Documentation - Exploring The Apple FaceTime Bug with ReasonML Stat</a></li>
<li><a href="https://dave.cheney.net/2019/07" time_added="1563998934" tags="">July | 2019 | Dave Cheney</a></li>
<li><a href="https://www.emfscientist.org/index.php/emf-scientist-appeal" time_added="1563916153" tags="">EMFscientist.org - International EMF Scientist Appeal</a></li>
<li><a href="https://simson.net/ref/1993/cubefire.html" time_added="1563406990" tags="">Date: Wed, 24 Mar 93 19:11:02 EST</a></li>
<li><a href="https://blog.trailofbits.com/2019/07/08/fuck-rsa/" time_added="1562611534" tags="">https://blog.trailofbits.com/2019/07/08/fuck-rsa/</a></li>
<li><a href="https://cubicoder.github.io/tutorials/1-12-2/2018-06-19-setting-up-the-development-environment/" time_added="1561837068" tags="">https://cubicoder.github.io/tutorials/1-12-2/2018-06-19-setting-up-the-development-environment/</a></li>
<li><a href="https://blog.ret2.io/2019/06/26/attacking-intel-tsx/" time_added="1561758090" tags="">https://blog.ret2.io/2019/06/26/attacking-intel-tsx/</a></li>
<li><a href="https://haifengl.wordpress.com/2014/07/15/ocaml-modules/" time_added="1561402247" tags="">https://haifengl.wordpress.com/2014/07/15/ocaml-modules/</a></li>
<li><a href="https://link.springer.com/article/10.1007/s11199-007-9188-2" time_added="1561385486" tags="">https://link.springer.com/article/10.1007/s11199-007-9188-2</a></li>
<li><a href="https://theofficialflow.github.io/2019/06/18/trinity.html" time_added="1560966932" tags="">https://theofficialflow.github.io/2019/06/18/trinity.html</a></li>
<li><a href="https://www.gq.com/story/too-much-sleep?utm_source=pocket-newtab" time_added="1560655287" tags="">https://www.gq.com/story/too-much-sleep?utm_source=pocket-newtab</a></li>
<li><a href="https://poverty.ucdavis.edu/faq/what-current-poverty-rate-united-states" time_added="1560461687" tags="">https://poverty.ucdavis.edu/faq/what-current-poverty-rate-united-states</a></li>
<li><a href="https://openwall.info/wiki/_media/people/jvanegue/files/spw15_heap_models_vanegue_latest.pdf" time_added="1560458104" tags="">https://openwall.info/wiki/_media/people/jvanegue/files/spw15_heap_models_vanegue_latest.pdf</a></li>
<li><a href="https://www.history.com/news/black-panthers-gun-control-nra-support-mulford-act" time_added="1560158011" tags="guns">The NRA Supported Gun Control When the Black Panthers Had the Weapons - HIS</a></li>
<li><a href="https://medium.com/analytics-vidhya/automated-keyword-extraction-from-articles-using-nlp-bfd864f41b34" time_added="1559863887" tags="">Automated Keyword Extraction from Articles using NLP</a></li>
<li><a href="https://www.airpair.com/nlp/keyword-extraction-tutorial" time_added="1559863867" tags="">NLP keyword extraction tutorial with RAKE and Maui</a></li>
<li><a href="https://raw.githubusercontent.com/microsoft/language-server-protocol/master/indexFormat/specification.md" time_added="1559676914" tags="">https://raw.githubusercontent.com/microsoft/language-server-protocol/master</a></li>
<li><a href="https://lobste.rs/" time_added="1559664681" tags="">https://lobste.rs/</a></li>
<li><a href="https://cr.yp.to/djb.html" time_added="1559664592" tags="">https://cr.yp.to/djb.html</a></li>
<li><a href="https://www.youtube.com/watch?v=kskrazLDq1A" time_added="1559265199" tags="bass,licks,tutorial">(208) Modulating Sweep Arpeggios &amp; Inversions - YouTube</a></li>
<li><a href="https://9p.io/sys/doc/auth.html" time_added="1559009236" tags="">https://9p.io/sys/doc/auth.html</a></li>
<li><a href="https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_rui" time_added="1558733340" tags="coding">Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication a</a></li>
<li><a href="https://gettys.wordpress.com/2018/02/11/the-blind-men-and-the-elephant/" time_added="1558402414" tags="networking">The Blind Men and the Elephant | jg&#039;s Ramblings</a></li>
<li><a href="https://briantimar.github.io/notes/mimetic/mimetic" time_added="1558394695" tags="psychology,selfhelp">mimetic</a></li>
<li><a href="https://linxz.co.uk/cryptography ground up/2019/01/25/CGU-Introduction.html" time_added="1558215317" tags="">https://linxz.co.uk/cryptography ground up/2019/01/25/CGU-Introduction.html</a></li>
<li><a href="http://fabiensanglard.net/gebbdoom_v1.1.pdf" time_added="1558214971" tags="">http://fabiensanglard.net/gebbdoom_v1.1.pdf</a></li>
<li><a href="https://alasdairmclachlanmusic.files.wordpress.com/2015/05/reapers.pdf" time_added="1558134294" tags="bass,tabs">Reapers</a></li>
<li><a href="https://www.frc.org/brochure/the-best-pro-life-arguments-for-secular-audiences" time_added="1558118336" tags="abortion">The Best Pro-Life Arguments for Secular Audiences</a></li>
<li><a href="https://static1.squarespace.com/static/51fab339e4b0dfbd79177ae2/t/5a1713bfec212d9bd3899787/1511461823827/Dean+Town+-+Vulfpeck+-+Joe+Dart+-+Bass+Transcription+-+Full+Score.pdf" time_added="1557936432" tags="bass,sheetmusic,vulfpeck">Dean Town - Vulfpeck - Joe Dart - Bass Transcription - Full Score.pdf</a></li>
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf" time_added="1557760923" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2 - ModJack - Hijacking the MacOS Kernel - Zhi Zhou.pdf</a></li>
<li><a href="https://www.riverloopsecurity.com/blog/2019/05/pcode/" time_added="1557714695" tags="">https://www.riverloopsecurity.com/blog/2019/05/pcode/</a></li>
<li><a href="https://shafik.github.io/c++/undefined behavior/2019/05/11/explporing_undefined_behavior_using_constexpr.html" time_added="1557714601" tags="">https://shafik.github.io/c++/undefined behavior/2019/05/11/explporing_undefined_behavior_using_constexpr.html</a></li>
<li><a href="https://www.newyorker.com/books/under-review/eric-hobsbawm-the-communist-who-explained-history?utm_source=pocket-newtab" time_added="1557694965" tags="">https://www.newyorker.com/books/under-review/eric-hobsbawm-the-communist-who-explained-history?utm_source=pocket-newtab</a></li>
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf" time_added="1557680669" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf</a></li>
<li><a href="https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li &amp; Lilang Wu.pdf" time_added="1557544407" tags="">https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li &amp; Lilang Wu.pdf</a></li>
<li><a href="https://doar-e.github.io/blog/2019/05/09/circumventing-chromes-hardening-of-typer-bugs/" time_added="1557422692" tags="">https://doar-e.github.io/blog/2019/05/09/circumventing-chromes-hardening-of-typer-bugs/</a></li>
<li><a href="http://getpocket.com/explore/item/why-can-t-the-world-s-greatest-minds-solve-the-mystery-of-consciousness" time_added="1557422429" tags="">http://getpocket.com/explore/item/why-can-t-the-world-s-greatest-minds-solve-the-mystery-of-consciousness</a></li>
<li><a href="https://pdfs.semanticscholar.org/5a58/00deb6461b3d022c8465e5286908de9f8d4e.pdf" time_added="1557344627" tags="keyword extraction">c01.dvi</a></li>
<li><a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf" time_added="1557274238" tags="exploit,virtualbox">https://www.blackhat.com/docs/eu-17/materials/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdf</a></li>
<li><a href="https://jsthomas.github.io/map-comparison.html" time_added="1557210259" tags="benchmark,ocaml">Joe Thomas | Microbenchmarking Implementations of Map in OCaml</a></li>
<li><a href="https://www.tezos.org.sg/is-ocaml-really-easier-to-formally-verify/" time_added="1557210176" tags="formal-verification,ocaml">OCaml is easier to formally verify | Tezos Southeast Asia</a></li>
<li><a href="https://sparkes.zone/blog/ios/2019/04/30/machswap-ios-12-kernel-exploit.html" time_added="1556677724" tags="">https://sparkes.zone/blog/ios/2019/04/30/machswap-ios-12-kernel-exploit.html</a></li>
<li><a href="https://raygun.com/blog/golang-auto-scaling/" time_added="1556078720" tags="">https://raygun.com/blog/golang-auto-scaling/</a></li>
<li><a href="https://mgba.io/2017/07/31/holy-grail-bugs-2/" time_added="1556053764" tags="gameboy">&quot;Holy Grail&quot; Bugs in Emulation, Part 2 - mGBA</a></li>
<li><a href="https://mgba.io/2017/05/29/holy-grail-bugs/#pinball-fantasies" time_added="1556053755" tags="gameboy">&quot;Holy Grail&quot; Bugs in Emulation, Part 1 - mGBA</a></li>
<li><a href="https://accidentallyquadratic.tumblr.com/" time_added="1555985668" tags="">https://accidentallyquadratic.tumblr.com/</a></li>
<li><a href="https://stek29.rocks/2017/08/07/frida-stdstring.html" time_added="1554770966" tags="frida,reverse">Frida and std::string | stek29.rocks</a></li>
<li><a href="http://www.oldlinux.org/download/ECLK-5.0-WithCover.pdf" time_added="1554600086" tags="linux">ECLK-5.0-WithCover.pdf</a></li>
<li><a href="https://pleasestopnamingvulnerabilities.com/" time_added="1554593048" tags="android,rce,wifi">Please Stop Naming Vulnerabilities: Exploring 6 Previously Unknown Remote K</a></li>
<li><a href="http://www.bottomupcs.com/" time_added="1554327449" tags="computers">Computer Science from the Bottom Up</a></li>
<li><a href="https://latacora.micro.blog/2018/04/03/cryptographic-right-answers.html" time_added="1552674189" tags="">Cryptographic Right Answers</a></li>
<li><a href="https://www.multivax.com/last_question.html" time_added="1552602739" tags="">The Last Question -- Isaac Asimov</a></li>
<li><a href="https://blog.stephenwolfram.com/2019/02/seeking-the-productive-life-some-details-of-my-personal-infrastructure/" time_added="1550800883" tags="">https://blog.stephenwolfram.com/2019/02/seeking-the-productive-life-some-details-of-my-personal-infrastructure/</a></li>
<li><a href="https://sarabander.github.io/sicp/html/index.xhtml" time_added="1548965423" tags="">Structure and Interpretation of Computer Programs, 2e: Top</a></li>
<li><a href="http://janmidtgaard.dk/aiws15/" time_added="1548293606" tags="">Abstract Interpretation Winter School</a></li>
<li><a href="http://web.mit.edu/16.399/www/#lecture-18" time_added="1548293400" tags="">MIT Course 16.399: « Abstract Interpretation » Home Page</a></li>
<li><a href="https://blog.exodusintel.com/2019/01/22/exploiting-the-magellan-bug-on-64-bit-chrome-desktop/" time_added="1548270438" tags="">https://blog.exodusintel.com/2019/01/22/exploiting-the-magellan-bug-on-64-bit-chrome-desktop/</a></li>
<li><a href="http://newosxbook.com/articles/DYLD.html" time_added="1548117249" tags="">DYLD DetaYLeD</a></li>
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2012-11-09-dyld-dynamic-linking-on-os-x.html" time_added="1547538263" tags="">mikeash.com: Friday Q&amp;A 2012-11-09: dyld: Dynamic Linking On OS X</a></li>
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2017-06-30-dissecting-objc_msgsend-on-arm64.html" time_added="1547012353" tags="">mikeash.com: Friday Q&amp;A 2017-06-30: Dissecting objc_msgSend on ARM64</a></li>
<li><a href="http://m.nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it" time_added="1546714127" tags="">http://m.nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it</a></li>
<li><a href="https://getpocket.com/explore/item/love-after-life-nobel-winning-physicist-richard-feynman-s-extraordinary-letter-to-his-departed-wife" time_added="1546712423" tags="">https://getpocket.com/explore/item/love-after-life-nobel-winning-physicist-richard-feynman-s-extraordinary-letter-to-his-departed-wife</a></li>
<li><a href="https://hardflag.q3k.org/" time_added="1545326529" tags="">hardflag</a></li>
<li><a href="https://lightbulbone.com/posts/2015/12/bluetool/" time_added="1544919482" tags="">LightBulbOne</a></li>
<li><a href="https://blog.zimperium.com/cve-2018-9411-new-critical-vulnerability-multiple-high-privileged-android-services/" time_added="1544821262" tags="">CVE-2018-9411: New critical vulnerability in multiple high-privileged Andro</a></li>
<li><a href="https://www.windytan.com/2017/11/in-pursuit-of-otamas-tone.html" time_added="1544814084" tags="sdr">absorptions: In pursuit of Otama&#039;s tone</a></li>
<li><a href="http://blog.cyberexplorer.me/2014/01/sniffing-and-decoding-nrf24l01-and.html" time_added="1544814022" tags="sdr">Cyber Explorer: Sniffing and decoding NRF24L01 and Bluetooth LE packets fo</a></li>
<li><a href="https://justinmeiners.github.io/lc3-vm/" time_added="1544806188" tags="">https://justinmeiners.github.io/lc3-vm/</a></li>
<li><a href="https://www.samba.org/ftp/tridge/misc/french_cafe.txt" time_added="1544211442" tags="">https://www.samba.org/ftp/tridge/misc/french_cafe.txt</a></li>
<li><a href="https://esoteric.codes/blog/evan-buswell" time_added="1544030660" tags="">Evan Buswell - esoteric.codes</a></li>
<li><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/ms17-010-eternalblue/" time_added="1543542896" tags="">MS17-010: EternalBlue’s Large Non-Paged Pool Overflow in SRV Driver - Trend</a></li>
<li><a href="https://www.synacktiv.com/ressources/zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf" time_added="1543280687" tags="">Turning your BMC into a revolving door</a></li>
<li><a href="https://l.avala.mp/?p=285" time_added="1543271325" tags="">IPv666 – Address of the Beast – l.avala.mp&#039;s place</a></li>
<li><a href="https://www.cs.cornell.edu/~asampson/blog/llvm.html" time_added="1543026186" tags="">https://www.cs.cornell.edu/~asampson/blog/llvm.html</a></li>
<li><a href="http://newandroidbook.com/AIvI-M-RL1.pdf" time_added="1542826607" tags="">AIvI-M-RL1.pdf</a></li>
<li><a href="https://blogs.msdn.microsoft.com/oldnewthing/20181120-00/?p=100275" time_added="1542816216" tags="">https://blogs.msdn.microsoft.com/oldnewthing/20181120-00/?p=100275</a></li>
<li><a href="http://www.naturalborncoder.com/virtualization/2014/10/17/understanding-tun-tap-interfaces/" time_added="1542789259" tags="">Understanding TUN TAP Interfaces - Natural Born Coder</a></li>
<li><a href="http://geraldschroeder.com/wordpress/?page_id=4" time_added="1542700276" tags="">God According to God | Gerald Schroeder</a></li>
<li><a href="https://gamozolabs.github.io/fuzzing/2018/11/19/vectorized_emulation_mmu.html" time_added="1542660746" tags="">Vectorized Emulation: MMU Design | Gamozo Labs Blog</a></li>
<li><a href="https://www.iep.utm.edu/durkheim/" time_added="1542409538" tags="">Durkheim, Emile | Internet Encyclopedia of Philosophy</a></li>
<li><a href="https://www.newyorker.com/magazine/2016/01/25/dead-certainty" time_added="1542049681" tags="">https://www.newyorker.com/magazine/2016/01/25/dead-certainty</a></li>
<li><a href="https://www.newyorker.com/magazine/2016/10/10/karl-marx-yesterday-and-today" time_added="1541119709" tags="">Karl Marx, Yesterday and Today | The New Yorker</a></li>
<li><a href="http://slatestarcodex.com/2014/09/13/book-review-singer-on-marx/" time_added="1541119696" tags="">Book Review: Singer on Marx | Slate Star Codex</a></li>
<li><a href="http://zguide.zeromq.org/page:all" time_added="1540699129" tags="">ØMQ - The Guide - ØMQ - The Guide</a></li>
<li><a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" time_added="1540621305" tags="">The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies - Blo</a></li>
<li><a href="https://www.reddit.com/r/philosophy/comments/9njr1t/the_trolley_problem_a_website_that_gives_a/?st=JN6U4WLO&amp;sh=00536754" time_added="1539398530" tags="">https://www.reddit.com/r/philosophy/comments/9njr1t/the_trolley_problem_a_website_that_gives_a/?st=JN6U4WLO&amp;sh=00536754</a></li>
<li><a href="https://www.reddit.com/r/netsec/comments/9kq7le/cve201711176_a_stepbystep_linux_kernel/?st=JMRUMK8J&amp;sh=6823add2" time_added="1538492364" tags="">https://www.reddit.com/r/netsec/comments/9kq7le/cve201711176_a_stepbystep_linux_kernel/?st=JMRUMK8J&amp;sh=6823add2</a></li>
<li><a href="https://www.reddit.com/r/cpp/comments/9k9ryb/how_compilers_take_advantage_of_undefined/?st=JMPH1QHT&amp;sh=5547c0d3" time_added="1538348621" tags="">https://www.reddit.com/r/cpp/comments/9k9ryb/how_compilers_take_advantage_of_undefined/?st=JMPH1QHT&amp;sh=5547c0d3</a></li>
<li><a href="https://www.synacktiv.com/posts/hardware/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html" time_added="1537284159" tags="">Hunting mobile devices endpoints - the RF and the Hard way</a></li>
<li><a href="http://shell-storm.org/blog/Taint-analysis-and-pattern-matching-with-Pin/" time_added="1536615572" tags="pin,taint">shell-storm | Taint analysis and pattern matching with Pin</a></li>
<li><a href="http://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/" time_added="1536605803" tags="exploit,webkit">Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog</a></li>
<li><a href="https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/" time_added="1536605758" tags="">CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.</a></li>
<li><a href="https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware" time_added="1536598104" tags="">https://media.ccc.de/v/2018-154-internalblue-a-deep-dive-into-bluetooth-controller-firmware</a></li>
<li><a href="https://static1.squarespace.com/static/51fab339e4b0dfbd79177ae2/t/5a15ee65652dea2e1ac977d8/1511386730713/JoeDart.Vulfpeck.BirdsOfAFeather.BassTranscription+-+Full+Score.pdf" time_added="1535568339" tags="bass,vulfpeck">JoeDart.Vulfpeck.BirdsOfAFeather.BassTranscription - Full Score.pdf</a></li>
<li><a href="http://4ldebaran.blogspot.com/2018/07/covering-ian-beers-exploit-techniques.html" time_added="1534788150" tags="">http://4ldebaran.blogspot.com/2018/07/covering-ian-beers-exploit-techniques.html</a></li>
<li><a href="http://siguza.github.io/KTRR/" time_added="1534788124" tags="">http://siguza.github.io/KTRR/</a></li>
<li><a href="http://science.raphael.poss.name/go-calling-convention-x86-64.html" time_added="1533436909" tags="">http://science.raphael.poss.name/go-calling-convention-x86-64.html</a></li>
<li><a href="https://geekhack.org/index.php?topic=87689.0" time_added="1533070649" tags="">A modern handwiring guide - stronger, cleaner, easier</a></li>
<li><a href="https://www.thingiverse.com/thing:1433117/comments" time_added="1530128497" tags="">Ergodox EZ tent kit by rothgar - Thingiverse</a></li>
<li><a href="https://www.reddit.com/r/philosophy/comments/8u9bav/personal_adhominem_attacks_are_unfortunately/?st=JIX9XP7T&amp;sh=90e901e5" time_added="1530113275" tags="">https://www.reddit.com/r/philosophy/comments/8u9bav/personal_adhominem_attacks_are_unfortunately/?st=JIX9XP7T&amp;sh=90e901e5</a></li>
<li><a href="https://www.reddit.com/r/netsec/comments/8s9ze7/deserialization_vulnerabilities_attacking/?st=JIM7QL9O&amp;sh=662c3882" time_added="1529444455" tags="">https://www.reddit.com/r/netsec/comments/8s9ze7/deserialization_vulnerabilities_attacking/?st=JIM7QL9O&amp;sh=662c3882</a></li>
<li><a href="https://www.reddit.com/r/netsec/comments/8rp0i4/webusb_vulnerabilities_actions_of_yubico_and/?st=JIM7Q0W1&amp;sh=399dca74" time_added="1529444430" tags="">https://www.reddit.com/r/netsec/comments/8rp0i4/webusb_vulnerabilities_actions_of_yubico_and/?st=JIM7Q0W1&amp;sh=399dca74</a></li>
<li><a href="http://www.hpmor.com/" time_added="1528321191" tags="">Harry Potter and the Methods of Rationality | Petunia married a professor, </a></li>
<li><a href="https://courk.cc/index.php/2018/06/01/a-remote-vulnerability/" time_added="1528095190" tags="">A “Remote” Vulnerability – Courk&#039;s Blog</a></li>
<li><a href="https://imgur.com/a/mwTFj" time_added="1527796255" tags="">Wireless Split QMK = Mitosis - Album on Imgur</a></li>
<li><a href="http://podlipensky.com/2013/11/escape-unescaped/" time_added="1527705013" tags="">Escape unescaped - Pavel Podlipensky</a></li>
<li><a href="http://adereth.github.io/blog/2014/02/12/building-an-ergodox/" time_added="1527103639" tags="keyboards,mechanical">Sourcing and Building an ErgoDox Keyboard - adereth</a></li>
<li><a href="https://pointersgonewild.com/" time_added="1525821414" tags="">Pointers Gone Wild | A blog about compilers, programming and technology.</a></li>
<li><a href="https://www.edge.org/conversation/sabine_hossenfelder-looking-in-the-wrong-places?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1525212617" tags="">https://www.edge.org/conversation/sabine_hossenfelder-looking-in-the-wrong-places?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="https://getpocket.com/s/8Mr6i?cta=1&amp;src=ph" time_added="1525212578" tags="">https://getpocket.com/s/8Mr6i?cta=1&amp;src=ph</a></li>
<li><a href="https://github.com/zhengmin1989/GreatiOSJailbreakMaterial" time_added="1524177320" tags="jailbreak">zhengmin1989/GreatiOSJailbreakMaterial: Great iOS Jailbreak Material! - I r</a></li>
<li><a href="https://www.theverge.com/2016/4/13/11387934/internet-moderator-history-youtube-facebook-reddit-censorship-free-speech" time_added="1523483649" tags="">The secret rules of the internet</a></li>
<li><a href="https://www.1843magazine.com/features/why-do-we-work-so-hard" time_added="1523483580" tags="">Why do we work so hard? | 1843</a></li>
<li><a href="https://www.theatlantic.com/science/archive/2018/04/why-whales-got-so-big/557213/" time_added="1523141408" tags="">https://www.theatlantic.com/science/archive/2018/04/why-whales-got-so-big/557213/</a></li>
<li><a href="http://m.nautil.us/blog/the-self-is-other-people" time_added="1523141353" tags="">http://m.nautil.us/blog/the-self-is-other-people</a></li>
<li><a href="http://www.ii.uni.wroc.pl/~lukstafi/pmwiki/index.php?n=Functional.Functional" time_added="1521768668" tags="ocaml">Lukasz Stafiniak pages | Functional / Functional | browse</a></li>
<li><a href="https://www.youtube.com/watch?v=SvmluRCGv_s" time_added="1520897214" tags="">(51) Get Smart - I&#039;m So Happy!!!!! - YouTube</a></li>
<li><a href="https://bazad.github.io/2017/09/live-kernel-introspection-ios/bazad.github.io/2017/09/live-kernel-introspection-ios/" time_added="1516646525" tags="">https://bazad.github.io/2017/09/live-kernel-introspection-ios/bazad.github.io/2017/09/live-kernel-introspection-ios/</a></li>
<li><a href="https://siguza.github.io/IOHIDeous/" time_added="1514910461" tags="">https://siguza.github.io/IOHIDeous/</a></li>
<li><a href="https://www.reddit.com/r/programming/comments/7m8770/til_theres_a_community_called_dwitter_where/?st=JBOKHFF7&amp;sh=95d61ccc" time_added="1514349319" tags="">https://www.reddit.com/r/programming/comments/7m8770/til_theres_a_community_called_dwitter_where/?st=JBOKHFF7&amp;sh=95d61ccc</a></li>
<li><a href="http://uaf.io/exploitation/misc/2016/09/10/Kernel-Exploitation-for-Dummies.html" time_added="1513993857" tags="kernel">http://uaf.io/exploitation/misc/2016/09/10/Kernel-Exploitation-for-Dummies.html</a></li>
<li><a href="https://siguza.github.io/v0rtex/" time_added="1512721297" tags="">https://siguza.github.io/v0rtex/</a></li>
<li><a href="http://www.powerofcommunity.net/poc2016/keen.pdf" time_added="1512422981" tags="">http://www.powerofcommunity.net/poc2016/keen.pdf</a></li>
<li><a href="https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/" time_added="1511703279" tags="">https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/</a></li>
<li><a href="http://tinyhack.com/2014/07/07/exploiting-the-futex-bug-and-uncovering-towelroot/" time_added="1510608905" tags="android,exploit,kernel">Exploiting the Futex Bug and uncovering Towelroot – Tinyhack.com</a></li>
<li><a href="https://acmccs.github.io/papers/p2313-xuA.pdf" time_added="1510091199" tags="">p2313-xuA.pdf</a></li>
<li><a href="https://github.com/nongiach/CVE/tree/master/CVE-2017-5123" time_added="1509960664" tags="">CVE/CVE-2017-5123 at master · nongiach/CVE</a></li>
<li><a href="http://blog.ice9.us/" time_added="1508969724" tags="bluetooth">ICE9 Blog</a></li>
<li><a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf" time_added="1508959478" tags="">https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-E</a></li>
<li><a href="https://feross.org/gcc-ownage/" time_added="1508087955" tags="">https://feross.org/gcc-ownage/</a></li>
<li><a href="https://googleprojectzero.blogspot.co.uk/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" time_added="1507755039" tags="android">Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)</a></li>
<li><a href="https://copperhead.co/blog/2015/07/27/hardening-bionic" time_added="1507752236" tags="android">Hardening Android&#039;s Bionic libc | Blog | Copperhead Security</a></li>
<li><a href="https://static1.squarespace.com/static/543effd8e4b095fba39dfe59/t/584f572a2994ca1083f4aba3/1481594669596/BluetoothAttacksonHighSecurityElectronicLocksWhitepaper.pdf" time_added="1507747605" tags="">https://static1.squarespace.com/static/543effd8e4b095fba39dfe59/t/584f572a2994ca1083f4aba3/1481594669596/BluetoothAttacksonHighSecurityElectronicLocksWhitepaper.pdf</a></li>
<li><a href="http://gattack.io/whitepaper.pdf" time_added="1507747491" tags="">http://gattack.io/whitepaper.pdf</a></li>
<li><a href="https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-mmap-exploitation-whitepaper-2017-09-18.pdf" time_added="1507331602" tags="">mwri</a></li>
<li><a href="https://mollyrocket.com/casey/stream_0029.html" time_added="1507256961" tags="windows">The Worst API Ever Made</a></li>
<li><a href="http://gsec.hitb.org/materials/sg2017/D2%20-%20Adam%20Donenfeld%20-%20Ro(o)tten%20Apples%20-%20Vulnerability%20Heaven%20in%20the%20iOS%20Sandbox.pdf" time_added="1507249832" tags="">PowerPoint Presentation</a></li>
<li><a href="https://people.csail.mit.edu/albert/bluez-intro/c54.html" time_added="1507242153" tags="bluetooth">Bluetooth Programming Introduced</a></li>
<li><a href="http://people.csail.mit.edu/rudolph/Teaching/Articles/BTBook.pdf" time_added="1507242140" tags="bluetooh,bluetooth">BTBook.pdf</a></li>
<li><a href="https://chromium.googlesource.com/chromium/src/+/master/device/bluetooth/" time_added="1507242134" tags="">device/bluetooth - chromium/src - Git at Google</a></li>
<li><a href="https://addyosmani.com/resources/essentialjsdesignpatterns/book/" time_added="1507240584" tags="">Learning JavaScript Design Patterns</a></li>
<li><a href="http://tinylab.org/linux-lab/" time_added="1507165460" tags="">Technology - Linux kernel experimental environment</a></li>
<li><a href="https://arstechnica.com/gadgets/2017/09/macos-10-13-high-sierra-the-ars-technica-review/7/" time_added="1507067360" tags="mac">macOS 10.13 High Sierra: The Ars Technica review | Ars Technica</a></li>
<li><a href="http://turingh.github.io/2016/07/05/%E5%86%8D%E7%9C%8BCVE-2016-1757%E6%B5%85%E6%9E%90mach%20message%E7%9A%84%E4%BD%BF%E7%94%A8/" time_added="1507064192" tags="">再看CVE-2016-1757---浅析mach message的使用 | mrh的学习分享</a></li>
<li><a href="https://www.reddit.com/r/books/comments/73y5qc/unputdownable_17_books_i_read_in_24_hours_or_less/?st=J8BYLWPQ&amp;sh=8cc1f239" time_added="1507056636" tags="">https://www.reddit.com/r/books/comments/73y5qc/unputdownable_17_books_i_read_in_24_hours_or_less/?st=J8BYLWPQ&amp;sh=8cc1f239</a></li>
<li><a href="https://www.reddit.com/r/ReverseEngineering/comments/715whq/gas_pump_skimmers/?st=J7T8FDEM&amp;sh=c99b2286" time_added="1505924269" tags="">https://www.reddit.com/r/ReverseEngineering/comments/715whq/gas_pump_skimmers/?st=J7T8FDEM&amp;sh=c99b2286</a></li>
<li><a href="https://www.reddit.com/r/ReverseEngineering/comments/6yea64/flash_dumping_part_1/?st=J7A0Y687&amp;sh=7e8ae077" time_added="1504762852" tags="">https://www.reddit.com/r/ReverseEngineering/comments/6yea64/flash_dumping_part_1/?st=J7A0Y687&amp;sh=7e8ae077</a></li>
<li><a href="https://objective-see.com/blog/blog_0x21.html" time_added="1504669639" tags="">https://objective-see.com/blog/blog_0x21.html</a></li>
<li><a href="https://www.reddit.com/r/golang/comments/6ugzo2/domain_driven_design_and_go/?st=J6I1OQ6P&amp;sh=8103c36a" time_added="1503071038" tags="">https://www.reddit.com/r/golang/comments/6ugzo2/domain_driven_design_and_go/?st=J6I1OQ6P&amp;sh=8103c36a</a></li>
<li><a href="https://heideri.ch/thesis" time_added="1502311952" tags="">thesis</a></li>
<li><a href="https://databases.today/" time_added="1500323368" tags="">Public Database Directory - Public DB Host</a></li>
<li><a href="https://phoenhex.re/2017-07-06/pwn2own-sandbox-escape" time_added="1499443888" tags="">https://phoenhex.re/2017-07-06/pwn2own-sandbox-escape</a></li>
<li><a href="http://ddeville.me/2014/04/dynamic-linking" time_added="1498859829" tags="">Damien DeVille | Dynamic linking on iOS</a></li>
<li><a href="http://www.stafforini.com/txt/Covey%20-%20The%207%20habits%20of%20highly%20effective%20people.pdf" time_added="1498247805" tags="">Covey - The 7 habits of highly effective people.pdf</a></li>
<li><a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" time_added="1497911747" tags="">https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></li>
<li><a href="https://www.elttam.com.au/blog/intro-sdr-and-rf-analysis/" time_added="1497880623" tags="">https://www.elttam.com.au/blog/intro-sdr-and-rf-analysis/</a></li>
<li><a href="http://highaltitudehacks.com/2015/01/24/ios-application-security-part-38-attacking-apps-using-parse-guest-lecture-by-egor-tolstoy/" time_added="1497846544" tags="">iOS Application Security Part 38 - Attacking apps using Parse (Guest Lectur</a></li>
<li><a href="https://www.theverge.com/2017/6/13/15782200/one-device-secret-history-iphone-brian-merchant-book-excerpt" time_added="1497808869" tags="">The secret origin story of the iPhone - The Verge</a></li>
<li><a href="https://dennisforbes.ca/index.php/2016/12/23/androids-secure-enclave-private-content-and-strong-encryption/" time_added="1497808354" tags="secure enclave">Android’s “Secure Enclave” / Private Content and Strong Encryption – Dennis</a></li>
<li><a href="https://www.exploitee.rs/" time_added="1497725861" tags="">Exploitee.rs</a></li>
<li><a href="https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html" time_added="1497625694" tags="">https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html</a></li>
<li><a href="https://buer.haus/" time_added="1496269149" tags="">https://buer.haus/</a></li>
<li><a href="https://markmanson.net/life-cheat-codes" time_added="1495654761" tags="">https://markmanson.net/life-cheat-codes</a></li>
<li><a href="https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?" time_added="1495213358" tags="">iOS Testing</a></li>
<li><a href="https://pocket.co/sMCyh6?cta=1" time_added="1494705224" tags="">https://pocket.co/sMCyh6?cta=1</a></li>
<li><a href="http://moodycamel.com/blog/2013/a-fast-lock-free-queue-for-c++" time_added="1494111935" tags="">http://moodycamel.com/blog/2013/a-fast-lock-free-queue-for-c++</a></li>
<li><a href="http://www.hackerfactor.com/blog/index.php?/archives/762-Attacked-Over-Tor.html" time_added="1494106316" tags="">Attacked Over Tor - The Hacker Factor Blog</a></li>
<li><a href="https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf" time_added="1494035553" tags="">https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf</a></li>
<li><a href="https://pst.moe/paste/xciuzd" time_added="1493127822" tags="">xciuzd · pst.moe</a></li>
<li><a href="https://googleprojectzero.blogspot.fr/2017/04/exception-oriented-exploitation-on-ios.html" time_added="1492663026" tags="">Project Zero: Exception-oriented exploitation on iOS</a></li>
<li><a href="http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf" time_added="1492137402" tags="">http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf</a></li>
<li><a href="http://gnu.gds.tuwien.ac.at/software/hurd/gnumach-doc/mach_4.html" time_added="1491962467" tags="mach">The GNU Mach Reference Manual: Inter Process Communication</a></li>
<li><a href="https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md" time_added="1491850485" tags="">https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md</a></li>
<li><a href="https://rednaga.io/2017/04/09/remote_kext_debugging/" time_added="1491840718" tags="">https://rednaga.io/2017/04/09/remote_kext_debugging/</a></li>
<li><a href="https://www.raywenderlich.com/143828/macos-nstableview-tutorial" time_added="1491599044" tags="">macOS NSTableView Tutorial</a></li>
<li><a href="https://backchannel.com/love-in-the-time-of-cryptography-dd3a74193ffb" time_added="1491456653" tags="">Love in the Time of Cryptography – Backchannel</a></li>
<li><a href="http://yulingtianxia.com/blog/2016/06/15/Objective-C-Message-Sending-and-Forwarding/?locationNum=13&amp;fps=1" time_added="1491424284" tags="objc">Objective-C message sending and forwarding mechanism principle | yulingtian</a></li>
<li><a href="https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" time_added="1491336289" tags="exploit">Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)</a></li>
<li><a href="https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html" time_added="1491130445" tags="">https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html</a></li>
<li><a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" time_added="1490988700" tags="">An Illustrated Guide to the Kaminsky DNS Vulnerability</a></li>
<li><a href="https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/" time_added="1490735366" tags="android">Owning OnePlus 3/3T with a Malicious Charger: The Last Piece of the Puzzle</a></li>
<li><a href="http://taviso.decsystem.org/books.html" time_added="1490104517" tags="">Books.</a></li>
<li><a href="https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/" time_added="1489518680" tags="andorid,android">Attacking Nexus 9 with Malicious Headphones</a></li>
<li><a href="http://blog.seekintoo.com/diy-smart-home-security-meh.html" time_added="1489246907" tags="">http://blog.seekintoo.com/diy-smart-home-security-meh.html</a></li>
<li><a href="http://blog.quarkslab.com/reverse-engineering-samsung-s6-sboot-part-i.html" time_added="1488861943" tags="">Reverse Engineering Samsung S6 SBOOT - Part I</a></li>
<li><a href="http://omergil.blogspot.com.au/2017/02/web-cache-deception-attack.html?m=1" time_added="1488215777" tags="">http://omergil.blogspot.com.au/2017/02/web-cache-deception-attack.html?m=1</a></li>
<li><a href="https://crypto.stanford.edu/~dabo/cryptobook/draft_0_3.pdf" time_added="1488154312" tags="crypto">https://crypto.stanford.edu/~dabo/cryptobook/draft_0_3.pdf</a></li>
<li><a href="https://medium.com/@kayrus/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.x1gm88l68" time_added="1487780924" tags="">https://medium.com/@kayrus/hacking-android-phone-how-deep-the-rabbit-hole-goes-18b62ad65727#.x1gm88l68</a></li>
<li><a href="https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/" time_added="1487361855" tags="">Penetration Testing Tools Cheat Sheet</a></li>
<li><a href="http://stackoverflow.com/questions/24150030/storing-crc-into-an-axf-elf-file" time_added="1487109828" tags="">c - Storing CRC into an AXF/ELF file - Stack Overflow</a></li>
<li><a href="http://www.arachni-scanner.com/blog/arachnibrowser-js-data-flow-taint-tracing/" time_added="1487018231" tags="">Arachni::Browser: JS Data flow taint tracing - Arachni - Web Application Se</a></li>
<li><a href="https://insights.sei.cmu.edu/sei_blog/2017/02/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure.html" time_added="1486412663" tags="">https://insights.sei.cmu.edu/sei_blog/2017/02/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure.html</a></li>
<li><a href="http://www.synalysis.net/formats.xml" time_added="1486064857" tags="">The Grammar Page of Synalyze It!</a></li>
<li><a href="http://www.halfbakedmaker.org/blog/hcf4056-reveng" time_added="1485533656" tags="">Reverse engineering an HCF4056 BCD-to-7 segment decoder/driver chip from it</a></li>
<li><a href="https://alschwalm.com/blog/static/2017/01/24/reversing-c-virtual-functions-part-2-2/" time_added="1485437027" tags="">https://alschwalm.com/blog/static/2017/01/24/reversing-c-virtual-functions-part-2-2/</a></li>
<li><a href="http://www.halfdog.net/Security/" time_added="1485281730" tags="">Security-Related Activities</a></li>
<li><a href="https://githubengineering.com/githubs-post-csp-journey/" time_added="1485134182" tags="">https://githubengineering.com/githubs-post-csp-journey/</a></li>
<li><a href="https://www.evilsocket.net/2015/05/01/dynamically-inject-a-shared-library-into-a-running-process-on-androidarm/" time_added="1484968028" tags="">Dynamically Inject a Shared Library Into a Running Process on Android/ARM |</a></li>
<li><a href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf" time_added="1484765014" tags="">The Web Application Hacker&#039;s Handbook</a></li>
<li><a href="https://files.sans.org/summit/hackfest13/PDFs/Hacking%20Net%20Applications_PenTestSummit%20-%20James%20Jardine.pdf" time_added="1484764890" tags="">Hacking Net Applications_PenTestSummit - James Jardine.pdf</a></li>
<li><a href="https://www.researchgate.net/profile/Sebastian_Banescu/publication/311491954_Code_obfuscation_against_symbolic_execution_attacks/links/5849b78708ae82313e7108bf.pdf" time_added="1484522711" tags="">https://www.researchgate.net/profile/Sebastian_Banescu/publication/311491954_Code_obfuscation_against_symbolic_execution_attacks/links/5849b78708ae82313e7108bf.pdf</a></li>
<li><a href="https://cloud.google.com/security/security-design/" time_added="1484267786" tags="">Google Infrastructure Security Design Overview  |  Google Infrastructure Se</a></li>
<li><a href="https://getpocket.com/explore/item/what-romance-really-means-after-10-years-of-marriage-1189102354" time_added="1484244709" tags="">https://getpocket.com/explore/item/what-romance-really-means-after-10-years-of-marriage-1189102354</a></li>
<li><a href="https://www.youtube.com/watch?v=3RiGs08gtaY&amp;feature=share" time_added="1484116182" tags="">https://www.youtube.com/watch?v=3RiGs08gtaY&amp;feature=share</a></li>
<li><a href="https://labs.mwrinfosecurity.com/blog/when-biometric-access-control-devices-get-tcpip/" time_added="1484083768" tags="">Digital Lockpicking: Why Your Front Door Shouldn&#039;t Be On The Internet</a></li>
<li><a href="https://grsecurity.net/rap_faq.php" time_added="1484073620" tags="">grsecurity</a></li>
<li><a href="https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/" time_added="1484073561" tags="">SensePost | Exploiting ms16-098 rgnobj integer overflow on windows 8.1 x64 </a></li>
<li><a href="http://www.pagetable.com/?p=764" time_added="1483701042" tags="">http://www.pagetable.com/?p=764</a></li>
<li><a href="https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html?m=1" time_added="1483700517" tags="">https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html?m=1</a></li>
<li><a href="https://github.com/realnp/nvram_patcher/blob/master/nvram_patcher.c" time_added="1483292029" tags="">https://github.com/realnp/nvram_patcher/blob/master/nvram_patcher.c</a></li>
<li><a href="https://razygon.github.io/2016/09/23/iOS-kernel-heap-review-5-10/" time_added="1483052321" tags="ios">iOS kernel heap review 5-10 | Siyang&#039;s Depot</a></li>
<li><a href="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf" time_added="1482456852" tags="">https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf</a></li>
<li><a href="http://keenlab.tencent.com/en/2016/07/29/The-Journey-of-a-complete-OSX-privilege-escalation-with-a-single-vulnerability-Part-1/" time_added="1482272462" tags="">The Journey of a complete OSX privilege escalation with a single vulnerabil</a></li>
<li><a href="http://www.instructables.com/id/Bluetooth-Serial-Adapter-for-Pro-Mini/step2/Program-the-Bluetooth-transceiver/" time_added="1482026983" tags="">Bluetooth Serial Adapter for Pro Mini - 2</a></li>
<li><a href="https://rednaga.io/2016/09/21/reversing_go_binaries_like_a_pro/" time_added="1482006381" tags="">Reversing GO binaries like a pro | RedNaga Security</a></li>
<li><a href="https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/" time_added="1481940650" tags="">postMessage XSS on a million sites</a></li>
<li><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2" time_added="1481854875" tags="">965 - XNU kernel UaF due to lack of locking in set_dp_control_port - projec</a></li>
<li><a href="http://www.slideshare.net/codeblue_jp/master-canary-forging-by-yuki-koike-code-blue-2015" time_added="1481831142" tags="">Master Canary Forging by Yuki Koike - CODE BLUE 2015</a></li>
<li><a href="http://wapiflapi.github.io/2014/11/17/hacklu-oreo-with-ret2dl-resolve/" time_added="1481831139" tags="">Hack.lu&#039;s OREO with ret2dl-resolve · @wapiflapi</a></li>
<li><a href="http://netsec.ccert.edu.cn/wp-content/uploads/2015/10/2015-1029-yangkun-Gold-Mining-CTF.pdf" time_added="1481831102" tags="">掘金CTF</a></li>
<li><a href="http://tigress.cs.arizona.edu/" time_added="1481591161" tags="">tigress.cs.arizona.edu</a></li>
<li><a href="http://xillybus.com/tutorials/pci-express-tlp-pcie-primer-tutorial-guide-1" time_added="1481569614" tags="">Down to the TLP: How PCI express devices talk (Part I) | xillybus.com</a></li>
<li><a href="https://medium.freecodecamp.com/10-tips-to-maximize-your-javascript-debugging-experience-b69a75859329#.qiqq3v9u2" time_added="1481312455" tags="chrome">Things you probably didn’t know you could do with Chrome’s Developer Consol</a></li>
<li><a href="https://sysdig.com/blog/selinux-seccomp-falco-technical-discussion/" time_added="1481308642" tags="">Sysdig | SELinux, Seccomp, Falco, and You: A Technical Discussion</a></li>
<li><a href="https://jbme.qwertyoruiop.com/" time_added="1481221352" tags="">https://jbme.qwertyoruiop.com/</a></li>
<li><a href="http://documents.trendmicro.com/assets/pdf/shell-on-earth.pdf" time_added="1480783017" tags="">http://documents.trendmicro.com/assets/pdf/shell-on-earth.pdf</a></li>
<li><a href="http://homes.cs.washington.edu/~bholt/posts/llvm-debugging.html" time_added="1480707028" tags="llvm">Brandon Holt / LLVM Debugging Tips and Tricks</a></li>
<li><a href="https://web.archive.org/web/20160307114211/http://jamesmolloy.co.uk/tutorial_html/index.html" time_added="1480531795" tags="kernel,linux">JamesM&#039;s kernel development tutorials</a></li>
<li><a href="https://doar-e.github.io/blog/2016/11/27/clang-and-passes/" time_added="1480436097" tags="">https://doar-e.github.io/blog/2016/11/27/clang-and-passes/</a></li>
<li><a href="https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md" time_added="1480436070" tags="">https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md</a></li>
<li><a href="https://en.m.wikipedia.org/wiki/Survival_of_the_Sickest_(book)" time_added="1480208628" tags="">https://en.m.wikipedia.org/wiki/Survival_of_the_Sickest_(book)</a></li>
<li><a href="http://xkcd.com/341/" time_added="1480183861" tags="">http://xkcd.com/341/</a></li>
<li><a href="https://www.amazon.com/ap/signin?_encoding=UTF8&amp;openid.assoc_handle=anywhere_v2_us&amp;openid.claimed_id=http://specs.openid.net/auth/2.0/identifier_select&amp;openid.identity=http://specs.openid.net/auth/2.0/identifier_select&amp;openid.mode=checkid_setup&amp;openid.ns=http://specs.openid.net/auth/2.0&amp;openid.ns.pape=http://specs.openid.net/extensions/pape/1.0&amp;openid.pape.max_auth_age=0&amp;openid.return_to=https://www.amazon.com/gp/aw/psi.html?ie=UTF8&amp;cartID=154-7136015-4782555&amp;destinationURL=%2Fgp%2Faw%2Fya&amp;packedQuery=ref_%7Cnavm_hdr_profile&amp;pageId=anywhere_us&amp;tag=rnwap-20" time_added="1480113732" tags="">https://www.amazon.com/ap/signin?_encoding=UTF8&amp;openid.assoc_handle=anywhere_v2_us&amp;openid.claimed_id=http://specs.openid.net/auth/2.0/identifier_select&amp;openid.identity=http://specs.openid.net/auth/2.0/identifier_select&amp;openid.mode=checkid_setup&amp;openid.ns=http://specs.openid.net/auth/2.0&amp;openid.ns.pape=http://specs.openid.net/extensions/pape/1.0&amp;openid.pape.max_auth_age=0&amp;openid.return_to=https://www.amazon.com/gp/aw/psi.html?ie=UTF8&amp;cartID=154-7136015-4782555&amp;destinationURL=%2Fgp%2Faw%2Fya&amp;packedQuery=ref_%7Cnavm_hdr_profile&amp;pageId=anywhere_us&amp;tag=rnwap-20</a></li>
<li><a href="http://elasticsheep.com/2010/04/teensy2-usb-mass-storage-with-an-sd-card/" time_added="1479958822" tags="">Teensy2 USB Mass Storage with an SD card</a></li>
<li><a href="http://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html?m=1" time_added="1479844860" tags="">http://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html?m=1</a></li>
<li><a href="https://github.com/Dor1s/libfuzzer-workshop" time_added="1479844470" tags="">https://github.com/Dor1s/libfuzzer-workshop</a></li>
<li><a href="http://harrisonhjones.com/2014/07/15/reverse-bluetooth-keyboard/" time_added="1479529842" tags="bluetooth,keyboard">Harrison H. Jones » Reverse Bluetooth Keyboard</a></li>
<li><a href="https://excess-xss.com/" time_added="1479412287" tags="">Excess XSS: A comprehensive tutorial on cross-site scripting</a></li>
<li><a href="http://ramtin-amin.fr/#nvmepcie" time_added="1479406482" tags="">http://ramtin-amin.fr/#nvmepcie</a></li>
<li><a href="https://www.utdallas.edu/~zxl111930/file/Rewards_NDSS10.pdf" time_added="1479168495" tags="">https://www.utdallas.edu/~zxl111930/file/Rewards_NDSS10.pdf</a></li>
<li><a href="https://www.usenix.org/legacy/event/woot11/tech/final_files/Oakley.pdf" time_added="1479166506" tags="">https://www.usenix.org/legacy/event/woot11/tech/final_files/Oakley.pdf</a></li>
<li><a href="https://tia.mat.br/posts/2016/11/08/infect_to_protect.html" time_added="1479075656" tags="">Infect to Protect — Leandro Pereira</a></li>
<li><a href="https://pzemtsov.github.io/2016/11/06/bug-story-alignment-on-x86.html" time_added="1479075524" tags="">A bug story: data alignment on x86</a></li>
<li><a href="https://media.blackhat.com/bh-us-12/Briefings/Forshaw/BH_US_12_Forshaw_Are_You_My_Type_WP.pdf" time_added="1478416237" tags="">BH_US_12_Forshaw_Are_You_My_Type_WP.pdf</a></li>
<li><a href="https://insinuator.net/2016/10/linq-injection-from-attacking-filters-to-code-execution/" time_added="1478416009" tags="">Linq Injection – From Attacking Filters to Code Execution – Insinuator.net</a></li>
<li><a href="http://tukan.farm/2016/11/03/once-upon-a-realloc/" time_added="1478181972" tags="">http://tukan.farm/2016/11/03/once-upon-a-realloc/</a></li>
<li><a href="https://hackerone.com/reports/178152" time_added="1478181550" tags="">https://hackerone.com/reports/178152</a></li>
<li><a href="https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf" time_added="1478181516" tags="">https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf</a></li>
<li><a href="https://speakerdeck.com/flankerhqd/the-python-bites-your-apple-fuzzing-and-exploiting-osx-kernel-bugs" time_added="1478030710" tags="">The Python bites your apple - fuzzing and exploiting OSX Kernel bugs // Spe</a></li>
<li><a href="http://arstechnica.com/gadgets/2016/10/building-android-a-40000-word-history-of-googles-mobile-os/" time_added="1478015653" tags="">The (updated) history of Android | Ars Technica</a></li>
<li><a href="https://github.com/hasherezade/demos?files=1" time_added="1477833968" tags="">https://github.com/hasherezade/demos?files=1</a></li>
<li><a href="https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/" time_added="1477833561" tags="">https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/</a></li>
<li><a href="https://www.invincealabs.com/blog/2016/10/pixhawk-firmware-hooking/" time_added="1477582858" tags="">Invincea Labs</a></li>
<li><a href="https://www.martijnlibbrecht.nu/2/" time_added="1477456560" tags="">Blog - Martijn Libbrecht</a></li>
<li><a href="http://keenlab.tencent.com/en/2016/07/22/WindowServer-The-privilege-chameleon-on-macOS-Part-1/" time_added="1477428184" tags="">WindowServer: The privilege chameleon on macOS (Part 1) | Keen Security Lab</a></li>
<li><a href="https://www.exploit-db.com/docs/39527.pdf" time_added="1477416523" tags="">39527.pdf</a></li>
<li><a href="https://www.cl.cam.ac.uk/~pes20/rems/papers/oopsla-elf-linking-2016.pdf" time_added="1477362514" tags="">oopsla-elf-linking-2016.pdf</a></li>
<li><a href="http://dbp-consulting.com/tutorials/debugging/linuxProgramStartup.html" time_added="1477192438" tags="linux">Linux x86 Program Start Up</a></li>
<li><a href="http://jarmoc.com/blog/2013/05/28/ror-cve-2013-0156-in-the-wild/" time_added="1477006147" tags="">RoR CVE-2013-0156 In the Wild - Jarmoc.com</a></li>
<li><a href="http://secalert.net/slack-security-bug-bounty.html" time_added="1476984442" tags="">secalert on security</a></li>
<li><a href="http://www.antenna-theory.com/" time_added="1476928296" tags="">The Antenna Theory Website</a></li>
<li><a href="http://www.syssec-project.eu/m/page-media/158/syssec-summer-school-Evading-Emulator.pdf" time_added="1476786751" tags="">http://www.syssec-project.eu/m/page-media/158/syssec-summer-school-Evading-Emulator.pdf</a></li>
<li><a href="https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.7-Bypassing-Sandboxes-for-Fun.pdf" time_added="1476786664" tags="">https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.7-Bypassing-Sandboxes-for-Fun.pdf</a></li>
<li><a href="https://github.com/ud2/advisories/blob/2d5072e7f678582eab3fb68806bd02584dfad2c5/osx/graveyard/cve-2015-3777/xpc_blued_overflow1.c" time_added="1476207064" tags="">https://github.com/ud2/advisories/blob/2d5072e7f678582eab3fb68806bd02584dfad2c5/osx/graveyard/cve-2015-3777/xpc_blued_overflow1.c</a></li>
<li><a href="https://media.blackhat.com/bh-us-10/presentations/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-slides.pdf" time_added="1476158758" tags="">Browser-Based Covert Data Exfiltration</a></li>
<li><a href="http://netsec.ws/?p=331" time_added="1476113851" tags="metasploit,shellcode">Creating Metasploit Payloads</a></li>
<li><a href="https://www.exploit-db.com/exploits/35742/" time_added="1475686583" tags="mach">Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation</a></li>
<li><a href="http://2013.zeronights.org/includes/docs/Meder_Kydyraliev_-_Mining_Mach_Services_within_OS_X_Sandbox.pdf" time_added="1475686504" tags="mach">Meder_Kydyraliev_-_Mining_Mach_Services_within_OS_X_Sandbox.pdf</a></li>
<li><a href="https://pdos.csail.mit.edu/6.828/2011/labs/lab6/" time_added="1475588781" tags="">https://pdos.csail.mit.edu/6.828/2011/labs/lab6/</a></li>
<li><a href="https://littleosbook.github.io/" time_added="1475587322" tags="">https://littleosbook.github.io/</a></li>
<li><a href="http://www.cs.sjsu.edu/~stamp/RUA/homophonic.pdf" time_added="1475257058" tags="">homophonic.pdf</a></li>
<li><a href="https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf" time_added="1475167489" tags="">https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf</a></li>
<li><a href="https://blog.flanker017.me/cve-2016-4697-buffer-overrun-in-macos-kernel-driver/" time_added="1474892054" tags="">https://blog.flanker017.me/cve-2016-4697-buffer-overrun-in-macos-kernel-driver/</a></li>
<li><a href="https://github.com/radareorg/r2con/blob/master/2016/trainings/05-avr-explotation/avrworkshop_r2con.pdf" time_added="1474841533" tags="exploit">r2con/avrworkshop_r2con.pdf at master · radareorg/r2con</a></li>
<li><a href="https://github.com/kpwn/935csbypass/blob/master/cs_bypass.m" time_added="1474790386" tags="">https://github.com/kpwn/935csbypass/blob/master/cs_bypass.m</a></li>
<li><a href="https://github.com/felixwilhelm/mario_baslr/" time_added="1474790327" tags="">https://github.com/felixwilhelm/mario_baslr/</a></li>
<li><a href="http://www.contextis.com/resources/blog/porting-exploits-netgear-wnr2200/" time_added="1474573665" tags="">Porting exploits to a Netgear WNR2200</a></li>
<li><a href="http://memory-analysis.rekall-forensic.com/www/TOC/" time_added="1474463275" tags="">http://memory-analysis.rekall-forensic.com/www/TOC/</a></li>
<li><a href="https://www.blackhat.com/docs/us-16/materials/us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root-wp.pdf" time_added="1474380765" tags="">https://www.blackhat.com/docs/us-16/materials/us-16-Chen-Subverting-Apple-Graphics-Practical-Approaches-To-Remotely-Gaining-Root-wp.pdf</a></li>
<li><a href="http://www.zdziarski.com/blog/?p=6015" time_added="1474377305" tags="">http://www.zdziarski.com/blog/?p=6015</a></li>
<li><a href="https://deadcode.me/blog/2016/09/02/Blind-Java-Deserialization-Commons-Gadgets.html" time_added="1474253790" tags="java">Blind Java Deserialization Vulnerability - Commons Gadgets</a></li>
<li><a href="https://deadcode.me/blog/2016/09/18/Blind-Java-Deserialization-Part-II.html" time_added="1474253519" tags="java">Blind Java Deserialization - Part II - exploitation rev 2</a></li>
<li><a href="https://www.tu-braunschweig.de/Medien-DB/sec/pubs/2016-ccs.pdf" time_added="1474252229" tags="">Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to </a></li>
<li><a href="https://github.com/michalmalik/linux-re-101/blob/master/README.md" time_added="1474251314" tags="">linux-re-101/README.md at master · michalmalik/linux-re-101</a></li>
<li><a href="https://github.com/nccgroup/featherduster" time_added="1474237026" tags="">nccgroup/featherduster: An automated, modular cryptanalysis tool</a></li>
<li><a href="http://arunsureshkumar.me/index.php/2016/09/16/facebook-page-takeover-zero-day-vulnerability/" time_added="1474210970" tags="bug bounty">Facebook Page Takeover – Zero Day Vulnerability – Arun Sureshkumar</a></li>
<li><a href="http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/" time_added="1474171699" tags="">http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/</a></li>
<li><a href="https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png" time_added="1474155349" tags="exploit heap">heap.png (4350×2247)</a></li>
<li><a href="http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/" time_added="1474033507" tags="">http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/</a></li>
<li><a href="http://imrannazar.com/GameBoy-Emulation-in-JavaScript" time_added="1473875137" tags="emulation">Imran Nazar: GameBoy Emulation in JavaScript: The CPU</a></li>
<li><a href="https://www.usenix.org/conference/woot13/workshop-program/presentation/Shapiro" time_added="1473815581" tags="elf">“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata | USE</a></li>
<li><a href="http://security.cs.rpi.edu/courses/hwre-spring2014/" time_added="1473738194" tags="">CSCI 4974 / 6974 Hardware Reverse Engineering</a></li>
<li><a href="https://github.com/0xAX/linux-insides/blob/master/Misc/program_startup.md" time_added="1473653496" tags="">https://github.com/0xAX/linux-insides/blob/master/Misc/program_startup.md</a></li>
<li><a href="https://m.youtube.com/watch?v=Svm5V4leEho" time_added="1473653399" tags="">https://m.youtube.com/watch?v=Svm5V4leEho</a></li>
<li><a href="https://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/" time_added="1473630350" tags="web">Abusing JSONP with Rosetta Flash</a></li>
<li><a href="http://demo-effects.sourceforge.net/" time_added="1473360212" tags="">The Demo Effects Collection</a></li>
<li><a href="http://sektioneins.de/en/blog/16-09-05-pegasus-ios-kernel-vulnerability-explained-part-2.html" time_added="1473167964" tags="exploit,mac">PEGASUS iOS Kernel Vulnerability Explained - Part 2 | SektionEins GmbH</a></li>
<li><a href="https://media.blackhat.com/bh-us-11/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf" time_added="1472966907" tags="">https://media.blackhat.com/bh-us-11/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf</a></li>
<li><a href="https://github.com/NoviceLive/research-rootkit?utm_content=bufferca60c&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer" time_added="1472966809" tags="">https://github.com/NoviceLive/research-rootkit?utm_content=bufferca60c&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer</a></li>
<li><a href="https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45542.pdf" time_added="1472966772" tags="">https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45542.pdf</a></li>
<li><a href="https://www.blackhat.com/docs/us-16/materials/us-16-Adrian-A-Retrospective-On-The-Use-of-Export-Cryptography.pdf" time_added="1472966332" tags="">https://www.blackhat.com/docs/us-16/materials/us-16-Adrian-A-Retrospective-On-The-Use-of-Export-Cryptography.pdf</a></li>
<li><a href="https://bazad.github.io/2016/05/mac-os-x-use-after-free/" time_added="1472835080" tags="">https://bazad.github.io/2016/05/mac-os-x-use-after-free/</a></li>
<li><a href="http://newosxbook.com/files/HITSB.pdf" time_added="1472435350" tags="">http://newosxbook.com/files/HITSB.pdf</a></li>
<li><a href="http://www.payatu.com/uninitialized-stack-variable/" time_added="1472420504" tags="">http://www.payatu.com/uninitialized-stack-variable/</a></li>
<li><a href="http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/avoid-race.html" time_added="1472355711" tags="exploit,vulnerabilities">Avoid Race Conditions</a></li>
<li><a href="https://papers.put.as/papers/macosx/2015/OSXScale.pdf" time_added="1472355528" tags="fuzz,fuzzing,mac">https://papers.put.as/papers/macosx/2015/OSXScale.pdf</a></li>
<li><a href="https://paragonie.com/blog/2016/08/on-insecurity-popular-open-source-php-cms-platforms" time_added="1472166364" tags="bug bounty,web">On the (in)security of popular open source Content Management Systems writt</a></li>
<li><a href="http://stackoverflow.com/questions/5741187/sql-injection-that-gets-around-mysql-real-escape-string/12118602#12118602" time_added="1472166349" tags="sql injection,web">php - SQL injection that gets around mysql_real_escape_string() - Stack Ove</a></li>
<li><a href="https://medium.com/@mnakamura1337/reverse-engineering-visual-novels-101-d0bc3bf7ab8#.r4uzykqus" time_added="1472150351" tags="reverse">Reverse engineering visual novels 101 – Medium</a></li>
<li><a href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/" time_added="1471643399" tags="bug bounty">High frequency security bug hunting: 120 days, 120 bugs</a></li>
<li><a href="http://m.imgur.com/a/5ZtYn" time_added="1471569807" tags="keyboards">http://m.imgur.com/a/5ZtYn</a></li>
<li><a href="https://labs.mwrinfosecurity.com/blog/usb-fuzzing-for-the-masses/" time_added="1471466351" tags="exploit,usb">USB Fuzzing for the Masses</a></li>
<li><a href="https://www.exploit-db.com/papers/13176/" time_added="1470953471" tags="exploit,mac,mach">Vulnerability analysis, Security Papers, Exploit Tutorials - Part 13176</a></li>
<li><a href="http://shakthimaan.com/downloads/hurd/A.Programmers.Guide.to.the.Mach.System.Calls.pdf" time_added="1470337015" tags="mac,mach,osx">A.Programmers.Guide.to.the.Mach.System.Calls.pdf</a></li>
<li><a href="https://reverse.put.as/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/" time_added="1470187276" tags="exploit,osx">Shut up snitch! - reverse engineering and exploiting a critical Little Snit</a></li>
<li><a href="http://newosxbook.com/articles/HIDeAndSeek.html" time_added="1470172928" tags="ios,jailbreak">HIDden treasures - The Annotated (informal) Guide to TaiG - the untether</a></li>
<li><a href="http://newosxbook.com/articles/TaiG.html#iOS" time_added="1470172913" tags="ios,jailbreak">The Annotated Informal Guide to TaiG</a></li>
<li><a href="http://m.mentalfloss.com/article.php?id=80043&amp;utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1466704893" tags="">http://m.mentalfloss.com/article.php?id=80043&amp;utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://www.binsim.com/" time_added="1466437422" tags="">http://www.binsim.com/</a></li>
<li><a href="https://m.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640" time_added="1466177370" tags="bug bounty,web">https://m.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640</a></li>
<li><a href="https://blog.stratumsecurity.com/2016/06/13/websockets-auth/" time_added="1466036369" tags="web,websockets">Journey into WebSockets Authentication/Authorization</a></li>
<li><a href="https://www.blackhat.com/presentations/bh-usa-08/Stewart/BH_US_08_Stewart_Protocols_of_the_Storm.pdf" time_added="1465890088" tags="a,blackhat,malware">Protocols and Encryption of the Storm Botnet</a></li>
<li><a href="http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/" time_added="1465767565" tags="">Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The W</a></li>
<li><a href="http://nshipster.com/inter-process-communication/" time_added="1465506061" tags="ipc,mac">Inter-Process Communication - NSHipster</a></li>
<li><a href="http://blog.wuntee.sexy/CVE-2015-3795/" time_added="1465505954" tags="exploit,kernel,mac">CVE-2015-3795 · blog[wuntee]</a></li>
<li><a href="http://weis2016.econinfosec.org/wp-content/uploads/sites/2/2015/08/WEIS_2016_paper_76.pdf" time_added="1465415704" tags="bug bounty,web">WEIS_2016_paper_76.pdf</a></li>
<li><a href="http://joystick.artificialstudios.org/pubs/eurosec14.pdf" time_added="1465415609" tags="exploit,kernel,mac">eurosec14.pdf</a></li>
<li><a href="https://www.syscan360.org/slides/2012_EN_FindYourOwniOSKernelBug_XuHao_ChenXiaobo.pdf" time_added="1465415598" tags="exploit,kernel,mac">2012_EN_FindYourOwniOSKernelBug_XuHao_ChenXiaobo.pdf</a></li>
<li><a href="http://blog.malerisch.net/2013/09/burpcsj-tutorial-using-crawljax.html" time_added="1465415587" tags="burp,web">malerisch.net: BurpCSJ Tutorial - Using Crawljax</a></li>
<li><a href="http://resources.infosecinstitute.com/burps-session-handling-mechanisms/" time_added="1465415539" tags="burp,web">Burp Suite Tutorial: Session Handling Mechanisms - InfoSec Resources</a></li>
<li><a href="https://github.com/iagox86/dnscat2" time_added="1465415525" tags="dns,web">iagox86/dnscat2</a></li>
<li><a href="http://googleprojectzero.blogspot.com/2014_11_01_archive.html" time_added="1465415489" tags="exploit,safari">Project Zero: November 2014</a></li>
<li><a href="https://conference.hitb.org/hitbsecconf2016ams/materials/D2T2%20-%20Richard%20Johnson%20-%20Go%20Speed%20Tracer%20-%20Guided%20Fuzzing.pdf" time_added="1465197694" tags="exploit,fuzzing">Go Speed Tracer - rjohnson.pptx</a></li>
<li><a href="https://github.com/flankerhqd/IOUSBHID-IOHID-Overflow/blob/master/README.md" time_added="1464931644" tags="">https://github.com/flankerhqd/IOUSBHID-IOHID-Overflow/blob/master/README.md</a></li>
<li><a href="https://ge0n0sis.github.io/posts/2016/05/how-to-lock-the-samsung-download-mode-using-an-undocumented-feature-of-aboot/" time_added="1464241023" tags="">How to lock the samsung download mode using an undocumented feature of aboo</a></li>
<li><a href="https://media.blackhat.com/bh-eu-12/Royal/bh-eu-12-Royal-Entrapment-WP.pdf" time_added="1463978362" tags="">bh-eu-12-Royal-Entrapment-WP.pdf</a></li>
<li><a href="http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/" time_added="1463550972" tags="">Magento – Unauthenticated Remote Code Execution – 0-Days And Life</a></li>
<li><a href="http://blog.dinaburg.org/2013/06/optimizevm-fast-windows-guests-for.html" time_added="1462317127" tags="">OptimizeVM: Fast Windows Guests for VMware | Artem Dinaburg&#039;s Blog</a></li>
<li><a href="https://mazinahmed.net/uploads/Evading%20All%20Web-Application%20Firewalls%20XSS%20Filters.pdf" time_added="1462139167" tags="">Evading All Web-Application Firewalls XSS Filters.pdf</a></li>
<li><a href="https://eucalypt-forest.ctfcompetition.com/qwerty" time_added="1461953771" tags="">https://eucalypt-forest.ctfcompetition.com/qwerty</a></li>
<li><a href="https://blog.coresecurity.com/2016/04/25/exploiting-internet-explorers-ms15-106-part-i-vbscript-filter-type-confusion-vulnerability-cve-2015-6055/" time_added="1461630824" tags="">Exploiting Internet Explorer’s MS15-106, Part I: VBScript Filter Type Confu</a></li>
<li><a href="https://crypto.stanford.edu/pbc/notes/" time_added="1461351202" tags="">Ben Lynn - Notes</a></li>
<li><a href="http://cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf" time_added="1461187852" tags="">cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf</a></li>
<li><a href="https://insights.sei.cmu.edu/cert/2012/04/cert-linux-triage-tools-10-released.html" time_added="1460141274" tags="">CERT Linux Triage Tools 1.0 Released</a></li>
<li><a href="http://panamapapers.sueddeutsche.de/articles/56febfc0a1bb8d3c3495adf0/" time_added="1459827168" tags="">panamapapers.sueddeutsche.de/articles/56febfc0a1bb8d3c3495adf0/</a></li>
<li><a href="https://www.x41-dsec.de/lab/advisories/x41-2016-001-libotr/" time_added="1458590218" tags="">Memory Corruption Vulnerability in &quot;libotr&quot;</a></li>
<li><a href="http://www.scs.stanford.edu/~abelay/pdf/bittau:brop.pdf" time_added="1458449540" tags="">http://www.scs.stanford.edu/~abelay/pdf/bittau:brop.pdf</a></li>
<li><a href="http://cturt.github.io/ps4.html" time_added="1457800964" tags="">Hacking the PS4, part 1 - Introduction to PS4&#039;s security, and userland ROP</a></li>
<li><a href="http://phrack.org/issues/66/10.html" time_added="1457721327" tags="">.:: Phrack Magazine ::.</a></li>
<li><a href="https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/" time_added="1457721319" tags="">Exploit Writing Tutorial Part 10 : Chaining DEP With ROP – The Rubik’s[TM] </a></li>
<li><a href="https://web.archive.org/web/20140929030339/http://felixcloutier.com/greenhorn" time_added="1457721288" tags="">Greenhorn–the anatomy of a Windows 8 program exploit</a></li>
<li><a href="https://embed.cs.utah.edu/csmith/using.html" time_added="1457631149" tags="">Using Csmith</a></li>
<li><a href="https://wiki.skullsecurity.org/index.php?title=Example_7" time_added="1457630481" tags="">Example 7 - SkullSecurity</a></li>
<li><a href="http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/" time_added="1457623768" tags="">http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/</a></li>
<li><a href="https://blog.exodusintel.com/2016/02/10/firewall-hacking/" time_added="1457549550" tags="">Execute My Packet | Exodus Intelligence</a></li>
<li><a href="https://guidovranken.wordpress.com/2016/03/01/public-disclosure-malformed-private-keys-lead-to-heap-corruption-in-b2i_pvk_bio/" time_added="1457469186" tags="">Public disclosure: malformed private keys lead to heap corruption in OpenSS</a></li>
<li><a href="http://blog.ioactive.com/?m=1" time_added="1456371859" tags="">http://blog.ioactive.com/?m=1</a></li>
<li><a href="http://raspberrypi.stackexchange.com/questions/23839/interfacing-with-a-winbond-w25q64bv-flash-chip-via-spi" time_added="1456329231" tags="">python - Interfacing with a Winbond W25Q64BV flash chip via SPI - Raspberry</a></li>
<li><a href="http://www.cs.sjsu.edu/faculty/stamp/crypto/PowerPoint_PDF/16_MD5.pdf" time_added="1456286751" tags="">16_MD5.ppt</a></li>
<li><a href="http://www.iste.uni-stuttgart.de/fileadmin/user_upload/iste/zss/publications/supplementaryMaterial/2014-FSE-IncludingErrata.pdf" time_added="1455915964" tags="">http://www.iste.uni-stuttgart.de/fileadmin/user_upload/iste/zss/publications/supplementaryMaterial/2014-FSE-IncludingErrata.pdf</a></li>
<li><a href="http://www.loyalty.org/~schoen/rsa/" time_added="1455912816" tags="">Understanding Common Factor Attacks: An RSA-Cracking Puzzle</a></li>
<li><a href="http://pocket.co/soC6lN?cta=1" time_added="1455307111" tags="">http://pocket.co/soC6lN?cta=1</a></li>
<li><a href="http://beej.us/guide/bgipc/output/html/multipage/index.html" time_added="1454392180" tags="">Beej&#039;s Guide to Unix IPC</a></li>
<li><a href="http://repository.cmu.edu/cgi/viewcontent.cgi?article=1233&amp;context=ece" time_added="1454210840" tags="">viewcontent.cgi</a></li>
<li><a href="https://github.com/spender-sandbox/cuckoo-modified" time_added="1454209773" tags="">spender-sandbox/cuckoo-modified: Modified edition of cuckoo</a></li>
<li><a href="http://www.sift.net/sites/default/files/publications/icds_2015_4_40_10108%20(2).pdf" time_added="1454034487" tags="">http://www.sift.net/sites/default/files/publications/icds_2015_4_40_10108%20(2).pdf</a></li>
<li><a href="https://www.whitehatters.academy/intro-to-kernel-exploitation-part-1/" time_added="1454033178" tags="">Intro to Windows kernel exploitation 1/N: Kernel Debugging</a></li>
<li><a href="https://robert.sesek.com/2012/1/debugging_mach_ports.html" time_added="1453853520" tags="">Debugging Mach Ports - Robert Sesek</a></li>
<li><a href="https://hal.archives-ouvertes.fr/hal-01193025/document" time_added="1453614484" tags="">https://hal.archives-ouvertes.fr/hal-01193025/document</a></li>
<li><a href="http://blogs.msdn.com/b/ntdebugging/archive/2016/01/22/virtual-machine-managment-hangs-on-windows-server-2012-r2-hyper-v-host.aspx" time_added="1453574146" tags="">http://blogs.msdn.com/b/ntdebugging/archive/2016/01/22/virtual-machine-managment-hangs-on-windows-server-2012-r2-hyper-v-host.aspx</a></li>
<li><a href="http://vulnfactory.org/blog/2011/06/05/smep-what-is-it-and-how-to-beat-it-on-linux/" time_added="1453329704" tags="">Security Research by Dan Rosenberg</a></li>
<li><a href="https://github.com/rmusser01/Infosec_Reference/blob/96fc94d3bbdf19802f7ee1dc14d8e267dd717d36/Draft/Draft/Exploit%20Development.md" time_added="1452786724" tags="">Infosec_Reference/Exploit Development.md at 96fc94d3bbdf19802f7ee1dc14d8e26</a></li>
<li><a href="https://www.youtube.com/watch?v=N7EV4Q-OPBk" time_added="1452049646" tags="">Black Hat USA 2010: Understanding Fragmentation Heap: From Allocation to Ex</a></li>
<li><a href="https://fail0verflow.com/blog/2014/plaidctf2014-for450-rsa.html" time_added="1452033347" tags="">fail0verflow :: plaidCTF 2014 - rsa (for450)</a></li>
<li><a href="https://kitctf.de/writeups/32c3ctf/ranger/" time_added="1452006748" tags="">https://kitctf.de/writeups/32c3ctf/ranger/</a></li>
<li><a href="http://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/" time_added="1452006287" tags="">http://xlab.tencent.com/en/2016/01/04/use-chakra-engine-again-to-bypass-cfg/</a></li>
<li><a href="http://hdwsec.fr/blog/CVE-2015-0057.html" time_added="1451627133" tags="">HDW Sec - Blog</a></li>
<li><a href="http://www.cs.sjsu.edu/faculty/stamp/papers/topics/topic1/teja.pdf" time_added="1451626867" tags="">www.cs.sjsu.edu/faculty/stamp/papers/topics/topic1/teja.pdf</a></li>
<li><a href="http://intothesymmetry.blogspot.ch/2015/12/top-10-oauth-2-implementation.html?m=1" time_added="1450553223" tags="">http://intothesymmetry.blogspot.ch/2015/12/top-10-oauth-2-implementation.html?m=1</a></li>
<li><a href="http://sas2015.inria.fr/sas_invited_talk.pdf" time_added="1450474312" tags="">http://sas2015.inria.fr/sas_invited_talk.pdf</a></li>
<li><a href="http://blogs.flexerasoftware.com/vulnerability-management/2015/04/yet-another-windows-gdi-story.html" time_added="1450296167" tags="">Software Vulnerability Management: Yet Another Windows GDI Story</a></li>
<li><a href="https://secunia.com/blog/in-memory-of-a-zero-day--ms13-051-385/" time_added="1450296165" tags="">In memory of a zero-day - MS13-051</a></li>
<li><a href="http://patater.com/files/projects/manual/manual.html" time_added="1450252582" tags="">Introduction to Nintendo DS Programming</a></li>
<li><a href="https://lkml.org/lkml/2015/12/14/252" time_added="1450192139" tags="">https://lkml.org/lkml/2015/12/14/252</a></li>
<li><a href="https://faculty.ist.psu.edu/wu/papers/TaintPipe.pdf" time_added="1450191867" tags="">https://faculty.ist.psu.edu/wu/papers/TaintPipe.pdf</a></li>
<li><a href="http://en.wooyun.io/2015/12/08/33.html" time_added="1449777022" tags="">Obfuscation to Defeat Static and Dynamic Analysis Tools Using 32-bit/64-bit</a></li>
<li><a href="http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/" time_added="1449538399" tags="">Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege e</a></li>
<li><a href="http://intothesymmetry.blogspot.it/2015/12/a-quick-glance-at-modern-browserss.html" time_added="1449530421" tags="">Into the symmetry: A Quick Glance at Modern Browsers&#039;s Protection Part #1</a></li>
<li><a href="http://nsl.cs.columbia.edu/projects/minestrone/papers/outofcontrol_oakland14.pdf" time_added="1449269917" tags="">nsl.cs.columbia.edu/projects/minestrone/papers/outofcontrol_oakland14.pdf</a></li>
<li><a href="http://dreamsofastone.blogspot.de/2015/11/rowbuffer-side-channel-attacks.html?m=1" time_added="1448818343" tags="">http://dreamsofastone.blogspot.de/2015/11/rowbuffer-side-channel-attacks.html?m=1</a></li>
<li><a href="http://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html" time_added="1448506095" tags="">Deobfuscation: recovering an OLLVM-protected program</a></li>
<li><a href="https://labs.portcullis.co.uk/blog/windows-named-pipes-there-and-back-again/" time_added="1448158855" tags="">https://labs.portcullis.co.uk/blog/windows-named-pipes-there-and-back-again/</a></li>
<li><a href="https://www.exploit-db.com/exploits/38616/" time_added="1447825028" tags="">Python 2.7 array.fromstring Method - Use After Free - Exploits Database</a></li>
<li><a href="http://ho.ax/posts/2012/02/vmware-hardware-debugging/" time_added="1447819761" tags="">ho.ax - VMware debugging II: &quot;Hardware&quot; debugging</a></li>
<li><a href="http://resources.infosecinstitute.com/exploiting-linux-kernel-heap-corruptions-slub-allocator/" time_added="1447814328" tags="">Exploiting Linux Kernel Heap Corruptions (SLUB Allocator) - InfoSec Resourc</a></li>
<li><a href="https://onebitbug.me/2011/03/04/introducing-linux-kernel-symbols/" time_added="1447812087" tags="">Introducing Linux Kernel Symbols</a></li>
<li><a href="https://t.co/n9fLKMTc02?ssr=true" time_added="1447610225" tags="">https://t.co/n9fLKMTc02?ssr=true</a></li>
<li><a href="http://ho.ax/tag/lldb/" time_added="1447484409" tags="">ho.ax -</a></li>
<li><a href="https://www.endgame.com/blog/adobe-flash-vulnerability-cve-2015-7663-and-mitigating-exploits" time_added="1447255333" tags="">https://www.endgame.com/blog/adobe-flash-vulnerability-cve-2015-7663-and-mitigating-exploits</a></li>
<li><a href="http://www.slideshare.net/mobile/LiangChen13/poc2015-os-xkernelisasstrongasitsweakestpartliangshuaitian" time_added="1447168074" tags="">http://www.slideshare.net/mobile/LiangChen13/poc2015-os-xkernelisasstrongasitsweakestpartliangshuaitian</a></li>
<li><a href="http://sattia.blogspot.com/2014/04/exploiting-linux-kernel-heap.html" time_added="1446945358" tags="">Sameh Attia: Exploiting Linux Kernel Heap Corruptions (SLUB Allocator)</a></li>
<li><a href="http://redstack.net/blog/linux-kernel-2631-perf_counter_open-exploit.html#disqus_thread" time_added="1446791597" tags="">Linux kernel 2.6.31 perf_counter_open exploit</a></li>
<li><a href="http://jasindods.com/green/enlightenment/" time_added="1446779642" tags="">Index of /green/enlightenment</a></li>
<li><a href="https://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/" time_added="1446705452" tags="">Exploiting CVE-2015-0311: A Use-After-Free in Adobe Flash Player | Core Sec</a></li>
<li><a href="http://www.phrack.org/papers/self-patching-msxml.html" time_added="1446705353" tags="">.:: Phrack Magazine ::.</a></li>
<li><a href="http://cryptool.hgi.rub.de/index.html" time_added="1446562001" tags="">http://cryptool.hgi.rub.de/index.html</a></li>
<li><a href="https://marcan.st/2015/10/rescuing-a-broken-ntfs-filesystem/" time_added="1445868609" tags="">https://marcan.st/2015/10/rescuing-a-broken-ntfs-filesystem/</a></li>
<li><a href="http://webcache.googleusercontent.com/search?q=cache:6N65WeUBdnYJ:acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us" time_added="1445454203" tags="">CTF Writeup - HITCON CTF 2014 stkof or the &quot;unexploitable&quot; heap overflow ?</a></li>
<li><a href="http://webcache.googleusercontent.com/search?q=cache:yxC8GhtiWFEJ:acez.re/ctf-writeup-brad-oberbeg/+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us" time_added="1445454200" tags="">CTF Writeup - CSAW Finals 2013 Brad Oberberg</a></li>
<li><a href="http://www.contextis.com/documents/120/Glibc_Adventures-The_Forgotten_Chunks.pdf" time_added="1445447819" tags="">www.contextis.com/documents/120/Glibc_Adventures-The_Forgotten_Chunks.pdf</a></li>
<li><a href="http://luismiras.github.io/muymacho-exploiting_DYLD_ROOT_PATH/" time_added="1445315334" tags="">muymacho - exploiting DYLD_ROOT_PATH</a></li>
<li><a href="http://bottomupcs.com/elf.html" time_added="1444953772" tags="">ELF</a></li>
<li><a href="https://www.plcrashreporter.org/documentation/api/v1.2-beta1/mach_exceptions.html" time_added="1444849066" tags="">Plausible CrashReporter: Mach Exceptions on Mac OS X and iOS</a></li>
<li><a href="http://www.codeproject.com/Articles/70302/Redirecting-functions-in-shared-ELF-libraries" time_added="1444849055" tags="">Redirecting functions in shared ELF libraries - CodeProject</a></li>
<li><a href="https://labs.portcullis.co.uk/blog/cve-2015-5119-flash-bytearray-uaf-a-beginners-walkthrough/" time_added="1443372048" tags="">https://labs.portcullis.co.uk/blog/cve-2015-5119-flash-bytearray-uaf-a-beginners-walkthrough/</a></li>
<li><a href="https://github.com/smokeleeteveryday/CTF_WRITEUPS/blob/master/2015/MMACTF/reversing/simple_hash/README.md" time_added="1442854341" tags="">https://github.com/smokeleeteveryday/CTF_WRITEUPS/blob/master/2015/MMACTF/reversing/simple_hash/README.md</a></li>
<li><a href="http://talosintel.com/reports/TALOS-2015-0007/" time_added="1442589808" tags="">Talos Intel - Talos 2015 0007</a></li>
<li><a href="http://lockboxx.blogspot.com/2014/11/native-mac-os-x-application-mach-o.html" time_added="1442243572" tags="">LockBoxx: Native Mac OS X Application / Mach-O Backdoors for Pentesters</a></li>
<li><a href="https://www.cl.cam.ac.uk/~sps32/mcu_lock.html" time_added="1442183709" tags="">Breaking copy protection in microcontrollers</a></li>
<li><a href="http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide" time_added="1442122233" tags="">An Anti-Reverse Engineering Guide - CodeProject</a></li>
<li><a href="http://spareclockcycles.org/2012/02/14/stack-necromancy-defeating-debuggers-by-raising-the-dead/" time_added="1442119521" tags="antireversing,debugging">Spare Clock Cycles</a></li>
<li><a href="http://sandpile.org/" time_added="1442112545" tags="">http://sandpile.org/</a></li>
<li><a href="https://code.google.com/p/google-security-research/issues/detail?id=222" time_added="1442112306" tags="">https://code.google.com/p/google-security-research/issues/detail?id=222</a></li>
<li><a href="https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf" time_added="1441914240" tags="">https://securelist.com/files/2015/02/Equation_group_questions_and_answers.p</a></li>
<li><a href="https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/" time_added="1441913929" tags="">Flare-On Reversing Challenges 2015 – Trail of Bits Blog</a></li>
<li><a href="https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf" time_added="1441688927" tags="">https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Ma</a></li>
<li><a href="http://blog.quarkslab.com/usb-fuzzing-basics-from-fuzzing-to-bug-reporting.html" time_added="1441496774" tags="">USB Fuzzing Basics: From fuzzing to bug reporting</a></li>
<li><a href="https://www.blackhat.com/presentations/bh-usa-07/Dowd_McDonald_and_Mehta/Whitepaper/bh-usa-07-dowd_mcdonald_and_mehta.pdf" time_added="1441254031" tags="">https://www.blackhat.com/presentations/bh-usa-07/Dowd_McDonald_and_Mehta/Whitepaper/bh-usa-07-dowd_mcdonald_and_mehta.pdf</a></li>
<li><a href="http://udspace.udel.edu/bitstream/handle/19716/10145/Ryan_VanAntwerp_thesis.pdf?sequence=1" time_added="1441206722" tags="">udspace.udel.edu/bitstream/handle/19716/10145/Ryan_VanAntwerp_thesis.pdf?se</a></li>
<li><a href="https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit" time_added="1441160285" tags="">Information Security: Skynet, a Tor-powered bot... | Rapid7 Community</a></li>
<li><a href="http://www.cs.unm.edu/~treport/tr/02-12/zovi.pdf" time_added="1441044946" tags="">www.cs.unm.edu/~treport/tr/02-12/zovi.pdf</a></li>
<li><a href="http://blog.dragonsector.pl/2013/09/csaw-ctf-quals-2013-slurp-crypto-500.html" time_added="1440970690" tags="crypto,hashes">Dragon Sector: CSAW CTF Quals 2013 - slurp (crypto 500)</a></li>
<li><a href="http://www.scribd.com/doc/195135561/Jupiter-Collaboration-Operational-Transformation" time_added="1440719436" tags="">Jupiter Collaboration (Operational Transformation)</a></li>
<li><a href="http://pocket.co/sojqB3?cta=1" time_added="1440264781" tags="">http://pocket.co/sojqB3?cta=1</a></li>
<li><a href="http://www.nsaplayset.org/keysweeper" time_added="1440130466" tags="">KEYSWEEPER - NSA Playset</a></li>
<li><a href="http://www.codereversing.com/blog/archives/category/reveng" time_added="1440129498" tags="">RCE Endeavors » Reverse Engineering</a></li>
<li><a href="https://doar-e.github.io/blog/2015/08/18/keygenning-with-klee/" time_added="1440046497" tags="">Keygenning with KLEE - Diary of a reverse-engineer</a></li>
<li><a href="http://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/" time_added="1439488703" tags="">Hardware Side Channels in the Cloud – Trail of Bits Blog</a></li>
<li><a href="http://www.slideshare.net/torque59/exploiting-nosql-like-never-before" time_added="1439081356" tags="nosql,sql">Exploiting NoSQL Like Never Before</a></li>
<li><a href="https://web.archive.org/web/20140224142839/http://security.ece.cmu.edu/aeg/aeg-current.pdf" time_added="1438970949" tags="">https://web.archive.org/web/20140224142839/http://security.ece.cmu.edu/aeg/</a></li>
<li><a href="http://travisgoodspeed.blogspot.com/2012/07/emulating-usb-devices-with-python.html?m=1" time_added="1438901692" tags="">http://travisgoodspeed.blogspot.com/2012/07/emulating-usb-devices-with-python.html?m=1</a></li>
<li><a href="https://github.com/retme7/mate7_TZ_exploit/blob/master/doc/us-15-Shen-Attack-Your-Trusted-Core-wp.pdf" time_added="1438787313" tags="android">mate7_TZ_exploit/us-15-Shen-Attack-Your-Trusted-Core-wp.pdf at master · ret</a></li>
<li><a href="https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-798.pdf" time_added="1438547653" tags="">https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-798.pdf</a></li>
<li><a href="http://nelenkov.blogspot.ch/2014/10/revisiting-android-disk-encryption.html" time_added="1438547150" tags="android,encryption">Revisiting Android disk encryption</a></li>
<li><a href="https://theoverspill.wordpress.com/2015/07/30/the-adblocking-revolution-is-months-away-with-ios-9-with-trouble-for-advertisers-publishers-and-google/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1438444410" tags="">https://theoverspill.wordpress.com/2015/07/30/the-adblocking-revolution-is-months-away-with-ios-9-with-trouble-for-advertisers-publishers-and-google/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf" time_added="1438406249" tags="">https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf</a></li>
<li><a href="http://lcamtuf.coredump.cx/" time_added="1438362882" tags="">[lcamtuf.coredump.cx]</a></li>
<li><a href="http://www.msreverseengineering.com/blog/2015/7/30/smt-based-binary-program-analysis-course-sample-x86-assemblydisassembly" time_added="1438298831" tags="">SMT-Based Binary Program Analysis Course Sample: X86 Assembly/Disassembly —</a></li>
<li><a href="https://www.youtube.com/watch?v=DEDYk8zN53A" time_added="1438273065" tags="keygen">Reverse Engineering the LaFarge Crackme #2 and keygen - YouTube</a></li>
<li><a href="http://www.well-typed.com/blog/103/" time_added="1438185193" tags="">Well-Typed - The Haskell Consultants: Simple SMT solver for use in an optim</a></li>
<li><a href="https://www.cs.cmu.edu/~ecc/roku-nfp.html" time_added="1438092645" tags="">https://www.cs.cmu.edu/~ecc/roku-nfp.html</a></li>
<li><a href="https://www.youtube.com/watch?v=YUikShiPEg8" time_added="1437946423" tags="">Concolic Execution, Jonathan Salwan, LSE Week 2013 - YouTube</a></li>
<li><a href="https://jon.oberheide.org/" time_added="1437715409" tags="">jon.oberheide.org - welcome</a></li>
<li><a href="http://adamsblog.aperturelabs.com/" time_added="1437707368" tags="">Obviously a Major Malfunction...</a></li>
<li><a href="http://www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-1029" time_added="1437632834" tags="">www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-102</a></li>
<li><a href="http://gynvael.coldwind.pl/?blog=1" time_added="1437493086" tags="">gynvael.coldwind//vx.log</a></li>
<li><a href="http://ifsec.blogspot.com/2012/02/reliable-windows-7-exploitation-case.html" time_added="1437406494" tags="browser,ie">Ivan Fratric&#039;s Security Blog: Reliable Windows 7 Exploitation: A Case Study</a></li>
<li><a href="http://www.vupen.com/blog/20120710.Advanced_Exploitation_of_Internet_Explorer_HeapOv_CVE-2012-1876.php" time_added="1437406487" tags="exploit,ie,windows">VUPEN Vulnerability Research Blog - Advanced Exploitation of Internet Explo</a></li>
<li><a href="http://ifsec.blogspot.com/2013/11/exploiting-internet-explorer-11-64-bit.html" time_added="1437160693" tags="browser,ie">Ivan Fratric&#039;s Security Blog: Exploiting Internet Explorer 11 64-bit on Win</a></li>
<li><a href="http://www3.cs.stonybrook.edu/~mikepo/papers/devil.ndss15.pdf" time_added="1437090610" tags="browser,jit">www3.cs.stonybrook.edu/~mikepo/papers/devil.ndss15.pdf</a></li>
<li><a href="http://users.ece.cmu.edu/~arebert/papers/mayhem-oakland-12.pdf" time_added="1436582974" tags="automation,exploit">users.ece.cmu.edu/~arebert/papers/mayhem-oakland-12.pdf</a></li>
<li><a href="http://reverse.put.as/" time_added="1436578364" tags="hacking,mac">Reverse Engineering Mac OS X | Reverse Engineering and Security for fun and</a></li>
<li><a href="http://dslab.epfl.ch/pubs/cloud9.pdf" time_added="1436540238" tags="">dslab.epfl.ch/pubs/cloud9.pdf</a></li>
<li><a href="http://valgrind.org/docs/newsome2005.pdf" time_added="1436461878" tags="">valgrind.org/docs/newsome2005.pdf</a></li>
<li><a href="http://leafsr.com/research.html" time_added="1436410748" tags="hacking,whitepaper">Research</a></li>
<li><a href="https://media.blackhat.com/bh-us-12/Briefings/Rohlf/BH_US_12_Rohlf_Google_Native_Client_WP.pdf" time_added="1434323662" tags="browser,chrome,google,native client">https://media.blackhat.com/bh-us-12/Briefings/Rohlf/BH_US_12_Rohlf_Google_Native_Client_WP.pdf</a></li>
<li><a href="http://www.inf.fu-berlin.de/groups/ag-si/compsec_assign/Dowd2008.pdf" time_added="1434323651" tags="actionscript,dowd,exploit">http://www.inf.fu-berlin.de/groups/ag-si/compsec_assign/Dowd2008.pdf</a></li>
<li><a href="http://legbacore.com/Research_files/HowManyMillionBIOSesWouldYouLikeToInfect_Whitepaper_v1.pdf" time_added="1434323637" tags="bios,exploit">http://legbacore.com/Research_files/HowManyMillionBIOSesWouldYouLikeToInfect_Whitepaper_v1.pdf</a></li>
<li><a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" time_added="1429851521" tags="">http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/</a></li>
<li><a href="http://web.eecs.utk.edu/~huangj/cs360/lecture_notes.html" time_added="1429306694" tags="c,programming">CS360 -- Lecture Notes</a></li>
<li><a href="http://kitctf.de/writeups/insomnihack-teaser-2015/elysium/" time_added="1421779251" tags="ctf,heap">InsomniHack Teaser - elysium writeup</a></li>
</ul>
<h1>Read Archive</h1>
<ul>
<li><a href="https://americanaffairsjournal.org/2019/08/rotten-stem-how-technology-corrupts-education/" time_added="1580155132" tags="">Rotten STEM: How Technology Corrupts Education - American Affairs Journal</a></li>
<li><a href="https://cloudblog.withgoogle.com/products/gcp/tcp-bbr-congestion-control-comes-to-gcp-your-internet-just-got-faster/amp/" time_added="1580155128" tags="">TCP BBR congestion control comes to GCP – your Internet just got faster</a></li>
<li><a href="https://developers.google.com/machine-learning/guides/rules-of-ml" time_added="1577726647" tags="">Rules of Machine Learning:  |  ML Universal Guides  |  Google Developers</a></li>
<li><a href="http://journal.stuffwithstuff.com/2015/02/01/what-color-is-your-function/" time_added="1576809275" tags="">What Color is Your Function? – journal.stuffwithstuff.com</a></li>
<li><a href="https://medium.com/@morga046/creating-an-nlp-data-set-from-youtube-subtitles-fb59c0955c2" time_added="1576428397" tags="">Creating an NLP data set from YouTube subtitles. - William Morgan - Medium</a></li>
<li><a href="http://ai.intelligentonlinetools.com/ml/tag/search-results-clustering/" time_added="1576428369" tags="">search results clustering Archives - Text Analytics Techniques</a></li>
<li><a href="http://blog.interviewing.io/we-ran-the-numbers-and-there-really-is-a-pipeline-problem-in-eng-hiring/" time_added="1576428268" tags="">We ran the numbers, and there really is a pipeline problem in eng hiring. -</a></li>
<li><a href="https://quillette.com/2019/09/17/i-basically-just-made-it-up-confessions-of-a-social-constructionist/" time_added="1576386182" tags="">Confessions of a Social Constructionist - Quillette</a></li>
<li><a href="http://dataskunkworks.com/2018/06/06/extracting-topics-from-11000-newsgroups-posts-with-python-gensim-and-lda/" time_added="1576374582" tags="">Extracting topics from 11,000 Newsgroups posts with Python, Gensim and LDA </a></li>
<li><a href="http://inc.com/jeff-haden/10-things-incredibly-likable-people-never-ever-do-why-you-love-them-for-it.html" time_added="1575831318" tags="">http://inc.com/jeff-haden/10-things-incredibly-likable-people-never-ever-do-why-you-love-them-for-it.html</a></li>
<li><a href="https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit_Dev.md" time_added="1575830992" tags="">Infosec_Reference/Exploit_Dev.md at master · rmusser01/Infosec_Reference</a></li>
<li><a href="http://neuralnetworksanddeeplearning.com/chap1.html" time_added="1575830939" tags="">Neural networks and deep learning</a></li>
<li><a href="https://pielco11.ovh/posts/cloud-hunting/" time_added="1575830930" tags="">Unveiling IPs behind Cloudflare :: 0xNONEprivacy</a></li>
<li><a href="http://jalammar.github.io/illustrated-word2vec/" time_added="1575830905" tags="">The Illustrated Word2vec – Jay Alammar – Visualizing machine learning one c</a></li>
<li><a href="https://github.com/RaRe-Technologies/gensim/blob/develop/docs/notebooks/FastText_Tutorial.ipynb" time_added="1575830868" tags="">gensim/FastText_Tutorial.ipynb at develop · RaRe-Technologies/gensim · GitH</a></li>
<li><a href="https://radimrehurek.com/gensim/wiki.html" time_added="1575830862" tags="">gensim: Experiments on the English Wikipedia</a></li>
<li><a href="https://github.com/cemoody/lda2vec/blob/master/README.rst" time_added="1575829080" tags="">lda2vec/README.rst at master · cemoody/lda2vec · GitHub</a></li>
<li><a href="https://medium.com/containers-on-aws/scaling-a-realtime-chat-app-on-aws-using-socket-io-redis-and-aws-fargate-4ed63fb1b681" time_added="1575084040" tags="">Scaling a realtime chat app on AWS using Socket.io, Redis, and AWS Fargate</a></li>
<li><a href="https://tomassetti.me/best-programming-languages/" time_added="1574297214" tags="">The Best Programming Languages for each Situation</a></li>
<li><a href="https://blogs.dropbox.com/tech/2019/09/our-journey-to-type-checking-4-million-lines-of-python/" time_added="1574295619" tags="">Our journey to type checking 4 million lines of Python | Dropbox Tech Blog</a></li>
<li><a href="https://realpython.com/python-metaclasses/" time_added="1573981842" tags="">Python Metaclasses – Real Python</a></li>
<li><a href="https://github.com/google/sanitizers/blob/master/hwaddress-sanitizer/login_summer19_03_serebryany.pdf" time_added="1573931373" tags="">https://github.com/google/sanitizers/blob/master/hwaddress-sanitizer/login_summer19_03_serebryany.pdf</a></li>
<li><a href="https://towardsdatascience.com/keeping-it-classy-how-quizlet-uses-hierarchical-classification-to-label-content-with-academic-4e89a175ebe3" time_added="1572566904" tags="">Keeping It Classy: How Quizlet uses hierarchical classification to label co</a></li>
<li><a href="https://realpython.com/python-concurrency/" time_added="1571866736" tags="">Speed Up Your Python Program With Concurrency – Real Python</a></li>
<li><a href="https://snarky.ca/how-the-heck-does-async-await-work-in-python-3-5/" time_added="1571866732" tags="">How the heck does async/await work in Python 3.5?</a></li>
<li><a href="http://atlasobscura.com/articles/soviet-union-pepsi-ships" time_added="1568771937" tags="">http://atlasobscura.com/articles/soviet-union-pepsi-ships</a></li>
<li><a href="https://about.sourcegraph.com/blog/part-2-how-sourcegraph-scales-with-the-language-server-protocol" time_added="1568771924" tags="">Part 2: How Sourcegraph scales with the Language Server Protocol</a></li>
<li><a href="https://about.sourcegraph.com/blog/part-1-how-sourcegraph-scales-with-the-language-server-protocol" time_added="1568771421" tags="">Part 1: How Sourcegraph scales with the Language Server Protocol</a></li>
<li><a href="https://www.dropbox.com/s/llp24loq5odvyhk/Crown%20Sterling%20CEO%20-%20BH%2008.07.19.mov" time_added="1567135167" tags="">Crown Sterling CEO - BH 08.07.19.mov</a></li>
<li><a href="https://epxx.co/artigos/bluetooth_gatt.html" time_added="1567033618" tags="">Bluetooth: ATT and GATT</a></li>
<li><a href="https://www.twitlonger.com/show/n_1squrmi" time_added="1565919604" tags="">TwitLonger — When you talk too much for Twitter</a></li>
<li><a href="https://research.checkpoint.com/cryptographic-attacks-a-guide-for-the-perplexed/" time_added="1565918637" tags="">Cryptographic Attacks: A Guide for the Perplexed - Check Point Research</a></li>
<li><a href="https://www.ifixit.com/Guide/MacBook+Pro+15-Inch+Touch+Bar+2018+Battery+Replacement/122269" time_added="1565747024" tags="">MacBook Pro 15&quot; Touch Bar 2018 Battery Replacement - iFixit Repair Guide</a></li>
<li><a href="http://www.lihaoyi.com/post/HowtoconductagoodProgrammingInterview.html" time_added="1563851914" tags="">How to conduct a good Programming Interview</a></li>
<li><a href="http://tasvideos.org/6347S.html" time_added="1561570902" tags="">http://tasvideos.org/6347S.html</a></li>
<li><a href="https://zen-black.com/eric-weinstein-topics/" time_added="1561570885" tags="">Zen Black</a></li>
<li><a href="https://haifengl.wordpress.com/2014/07/14/ocaml-recursion/" time_added="1561402252" tags="ocaml">OCaml: Recursion | Haifeng&#039;s Random Walk</a></li>
<li><a href="http://getpocket.com/explore/item/these-are-the-most-secluded-hikes-in-the-u-s" time_added="1560896424" tags="">http://getpocket.com/explore/item/these-are-the-most-secluded-hikes-in-the-u-s</a></li>
<li><a href="https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/" time_added="1559733054" tags="">https://djhworld.github.io/post/2019/05/21/i-dont-know-how-cpus-work-so-i-simulated-one-in-code/</a></li>
<li><a href="https://ocaml.org/learn/tutorials/99problems.html" time_added="1559733051" tags="ocaml">99 problems – OCaml</a></li>
<li><a href="https://www.tarlogic.com/en/blog/how-to-attack-kerberos/" time_added="1559732946" tags="">https://www.tarlogic.com/en/blog/how-to-attack-kerberos/</a></li>
<li><a href="https://towardsdatascience.com/what-is-tail-recursion-elimination-or-why-functional-programming-can-be-awesome-43091d76915e" time_added="1559591330" tags="">How Functional Programming can be Awesome: Tail Recursion Elimination</a></li>
<li><a href="https://www.heritage.org/gender/commentary/sex-reassignment-doesnt-work-here-the-evidence" time_added="1557699308" tags="">https://www.heritage.org/gender/commentary/sex-reassignment-doesnt-work-here-the-evidence</a></li>
<li><a href="https://kristerw.blogspot.com/2019/04/how-llvm-optimizes-geometric-sums.html" time_added="1557698048" tags="">https://kristerw.blogspot.com/2019/04/how-llvm-optimizes-geometric-sums.html</a></li>
<li><a href="http://kcsrk.info/multicore/gc/2017/07/06/multicore-ocaml-gc/" time_added="1557681075" tags="garbage-collection,ocaml">A deep dive into Multicore OCaml garbage collector · KC Sivaramakrishnan</a></li>
<li><a href="https://pthree.org/2016/06/19/the-physics-of-brute-force" time_added="1557556963" tags="">Aaron Toponce : The Physics of Brute Force</a></li>
<li><a href="https://getpocket.com/explore/item/religion-for-the-nonreligious" time_added="1557556960" tags="">https://getpocket.com/explore/item/religion-for-the-nonreligious</a></li>
<li><a href="https://www.waitbutwhy.com/2013/11/how-to-beat-procrastination.html" time_added="1557556955" tags="">https://www.waitbutwhy.com/2013/11/how-to-beat-procrastination.html</a></li>
<li><a href="https://waitbutwhy.com/2014/06/taming-mammoth-let-peoples-opinions-run-life.html" time_added="1557556953" tags="">https://waitbutwhy.com/2014/06/taming-mammoth-let-peoples-opinions-run-life.html</a></li>
<li><a href="https://waitbutwhy.com/2013/11/life-is-picture-but-you-live-in-pixel.html" time_added="1557556949" tags="">https://waitbutwhy.com/2013/11/life-is-picture-but-you-live-in-pixel.html</a></li>
<li><a href="https://www.huffpost.com/highline/article/capitalist-takeover-college/" time_added="1557556933" tags="">https://www.huffpost.com/highline/article/capitalist-takeover-college/</a></li>
<li><a href="http://phrack.org/papers/viewer_discretion_advised.html" time_added="1557420815" tags="exploit">.:: Phrack Magazine ::.</a></li>
<li><a href="https://blog.rekawek.eu/2017/02/09/coffee-gb/" time_added="1556316439" tags="gameboy">Why did I spend 1.5 months creating a Gameboy emulator? · tomek&#039;s blog</a></li>
<li><a href="https://geosn0w.github.io/A-Long-Evening-With-macOS&#039;s-Sandbox/" time_added="1555294854" tags="">A long evening with iOS and macOS Sandbox – GeoSn0w – Programmer. Hacking s</a></li>
<li><a href="https://blog.golang.org/errors-are-values" time_added="1555294033" tags="">Errors are values - The Go Blog</a></li>
<li><a href="https://medium.com/@jon.gabilondo.angulo_7635/understanding-usbmux-and-the-ios-lockdown-service-7f2a1dfd07ae" time_added="1555293259" tags="ios">Understanding usbmux and the iOS lockdown service – Jon Gabilondo – Medium</a></li>
<li><a href="https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html" time_added="1555283228" tags="apple,pac">Project Zero: Examining Pointer Authentication on the iPhone XS</a></li>
<li><a href="http://insanecoding.blogspot.com/2014/05/a-good-idea-with-bad-usage-devurandom.html" time_added="1554756320" tags="linux,random">Insane Coding: A good idea with bad usage: /dev/urandom</a></li>
<li><a href="https://kov4l3nko.github.io/blog/2016-04-27-debugging-ios-binaries-with-lldb/#removing-aslr" time_added="1549311999" tags="">Debugging iOS binaries with LLDB - @kov4l3nko</a></li>
<li><a href="https://www.theatlantic.com/science/archive/2019/01/far-side-moon-china/579349/" time_added="1547796141" tags="">https://www.theatlantic.com/science/archive/2019/01/far-side-moon-china/579349/</a></li>
<li><a href="https://dangokyo.me/2018/01/16/extra-heap-exploitation-tcache-and-potential-exploitation/" time_added="1543794760" tags="">Extra Heap Exploitation 2: TCache and Potential Exploitation | 氷 菓</a></li>
<li><a href="https://blog.quarkslab.com/modern-jailbreaks-post-exploitation.html" time_added="1543026069" tags="">Modern Jailbreaks&#039; Post-Exploitation</a></li>
<li><a href="https://medium.com/hi-my-name-is-jon/how-to-invest-in-yourself-a98dfd33e81a" time_added="1538431712" tags="">How To Invest In Yourself.</a></li>
<li><a href="https://medium.com/time-dorks/how-i-became-a-morning-person-and-why-i-decided-to-make-the-change-eb1b012a16e5" time_added="1538431558" tags="">How I became a morning person (and why I decided to make the change)</a></li>
<li><a href="https://www.fs.blog/2018/04/inertia/" time_added="1538430818" tags="">https://www.fs.blog/2018/04/inertia/</a></li>
<li><a href="https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md" time_added="1538011142" tags="">owasp-mstg/0x05b-Reverse-Engineering-and-Tampering-Android.md at master · O</a></li>
<li><a href="https://medium.com/m/global-identity?redirectUrl=https://theringer.com/uber-lyft-return-to-austin-14ddfce7152" time_added="1538011124" tags="">https://medium.com/m/global-identity?redirectUrl=https://theringer.com/uber-lyft-return-to-austin-14ddfce7152</a></li>
<li><a href="https://www.theguardian.com/society/2018/apr/29/millennials-struggling-is-it-fault-of-baby-boomers-intergenerational-fairness" time_added="1538011059" tags="">https://www.theguardian.com/society/2018/apr/29/millennials-struggling-is-it-fault-of-baby-boomers-intergenerational-fairness</a></li>
<li><a href="http://www.businessinsider.com/jeff-bezo-advice-to-amazon-employees-dont-aim-for-work-life-balance-its-a-circle-2018-4" time_added="1538009587" tags="">http://www.businessinsider.com/jeff-bezo-advice-to-amazon-employees-dont-aim-for-work-life-balance-its-a-circle-2018-4</a></li>
<li><a href="http://www.phrack.org/papers/attacking_javascript_engines.html" time_added="1537670922" tags="exploit">.:: Phrack Magazine ::.</a></li>
<li><a href="https://www.theatlantic.com/education/archive/2018/04/early-childhood-outdoor-education/558959/" time_added="1537590342" tags="">https://www.theatlantic.com/education/archive/2018/04/early-childhood-outdoor-education/558959/</a></li>
<li><a href="http://www.breitbart.com/big-government/2015/09/21/heres-why-the-progressive-left-keeps-sticking-up-for-pedophiles/" time_added="1537590199" tags="">Why The Progressive Left Keeps Sticking Up For Pedophiles</a></li>
<li><a href="https://philwantsfish.github.io/security/java-deserialization-github" time_added="1537589867" tags="">philwantsfish</a></li>
<li><a href="https://blog.quarkslab.com/introduction-to-trusted-execution-environment-arms-trustzone.html" time_added="1537589840" tags="">Introduction to Trusted Execution Environment: ARM&#039;s TrustZone</a></li>
<li><a href="https://github.com/trailofbits/binjascripts/blob/master/find_heartbleed/find_heartbleed.py" time_added="1537589835" tags="">binjascripts/find_heartbleed.py at master · trailofbits/binjascripts</a></li>
<li><a href="http://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting" time_added="1533522060" tags="">http://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting</a></li>
<li><a href="https://www.fs.blog/general-thinking-tools/" time_added="1529106018" tags="">https://www.fs.blog/general-thinking-tools/</a></li>
<li><a href="https://www.theatlantic.com/health/archive/2011/10/all-work-and-no-play-why-your-kids-are-more-anxious-depressed/246422/?single_page=true" time_added="1526757278" tags="">All Work and No Play: Why Your Kids Are More Anxious, Depressed - The Atlan</a></li>
<li><a href="https://theoutline.com/post/4269/k-pop-propaganda-south-korea-north-korea-demilitarized-zone" time_added="1526000542" tags="">https://theoutline.com/post/4269/k-pop-propaganda-south-korea-north-korea-demilitarized-zone</a></li>
<li><a href="https://www.theguardian.com/commentisfree/2018/apr/29/revolution-in-our-understaning-of-depression-will-be-life-transforming" time_added="1525977087" tags="">https://www.theguardian.com/commentisfree/2018/apr/29/revolution-in-our-understaning-of-depression-will-be-life-transforming</a></li>
<li><a href="https://www.nytimes.com/2018/05/06/opinion/trump-supporters-economy-racism.html" time_added="1525826422" tags="">https://www.nytimes.com/2018/05/06/opinion/trump-supporters-economy-racism.html</a></li>
<li><a href="https://www.kennethreitz.org/essays/the-reality-of-developer-burnout" time_added="1524701612" tags="">The Reality of Developer Burnout — Kenneth Reitz</a></li>
<li><a href="http://mksben.l0.cm/2015/10/css-based-attack-abusing-unicode-range.html?m=1" time_added="1521522595" tags="">http://mksben.l0.cm/2015/10/css-based-attack-abusing-unicode-range.html?m=1</a></li>
<li><a href="http://nautil.us/issue/32/space/the-deep-space-of-digital-reading?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1521522404" tags="">Do You Read Differently Online and in Print?</a></li>
<li><a href="https://getpocket.com/s/Mpi_E" time_added="1521521163" tags="">https://getpocket.com/s/Mpi_E</a></li>
<li><a href="https://www.cs.uic.edu/~s/musings/equation-group/" time_added="1521521100" tags="">https://www.cs.uic.edu/~s/musings/equation-group/</a></li>
<li><a href="https://www.cs.uic.edu/~s/musings/equation-group-rc6/" time_added="1521521092" tags="">https://www.cs.uic.edu/~s/musings/equation-group-rc6/</a></li>
<li><a href="https://access.redhat.com/blogs/766093/posts/2592591" time_added="1521521050" tags="">A bite of Python - Red Hat Customer Portal</a></li>
<li><a href="http://willdrevo.com/fingerprinting-and-audio-recognition-with-python/" time_added="1521520944" tags="">Audio Fingerprinting with Python and Numpy · Will Drevo</a></li>
<li><a href="http://www.bakadesuyo.com/2016/10/how-to-resist-distraction/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1521520901" tags="">http://www.bakadesuyo.com/2016/10/how-to-resist-distraction/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://www.catb.org/~esr/faqs/smart-questions.html" time_added="1521520388" tags="">How To Ask Questions The Smart Way</a></li>
<li><a href="https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/" time_added="1521520321" tags="">https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/</a></li>
<li><a href="http://blog.talosintel.com/2016/11/crashing-stacks-without-squishing-bugs.html" time_added="1521517517" tags="">Cisco Talos Blog: Crashing Stacks Without Squishing Bugs: Advanced Vulnerab</a></li>
<li><a href="https://eev.ee/blog/2016/12/01/lets-stop-copying-c/" time_added="1521517434" tags="">https://eev.ee/blog/2016/12/01/lets-stop-copying-c/</a></li>
<li><a href="http://www.openculture.com/2017/04/the-tone-circle-john-coltrane-drew-to-illustrate-the-theory-behind-his-most-famous-compositions-1967.html?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1521515501" tags="">http://www.openculture.com/2017/04/the-tone-circle-john-coltrane-drew-to-illustrate-the-theory-behind-his-most-famous-compositions-1967.html?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/" time_added="1521515460" tags="">https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/</a></li>
<li><a href="https://thewalrus.ca/the-benefits-of-solitude/" time_added="1521515443" tags="">https://thewalrus.ca/the-benefits-of-solitude/</a></li>
<li><a href="https://www.nowsecure.com/blog/2013/10/03/ebay-for-android-content-provider-injection-vulnerability/" time_added="1520784118" tags="">eBay for Android Content Provider Injection Vulnerability - NowSecure</a></li>
<li><a href="https://www.ubercomp.com/posts/2014-01-16_facebook_remote_code_execution" time_added="1520784015" tags="">How I found a Remote Code Execution bug affecting Facebook&#039;s servers</a></li>
<li><a href="https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md" time_added="1520715015" tags="">https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md</a></li>
<li><a href="http://senthilthecoder.com/post/avr-toolchain-update-section/" time_added="1520714909" tags="">Making use of objcopy&#039;s --update-section for fun and profit | Senthil Kumar</a></li>
<li><a href="https://bugbountyforum.com/tools/exploitation-scanning/" time_added="1520714884" tags="">https://bugbountyforum.com/tools/exploitation-scanning/</a></li>
<li><a href="https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html" time_added="1520714879" tags="">FLARE Script Series: Automating Obfuscated String Decoding « Threat Researc</a></li>
<li><a href="http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/" time_added="1520714793" tags="">Rails Webconsole DNS Rebinding - Ben&#039;s Blog</a></li>
<li><a href="http://ourmachinery.com/post/virtual-memory-tricks/" time_added="1520712786" tags="">Virtual Memory Tricks · Our Machinery</a></li>
<li><a href="https://chromium.googlesource.com/chromium/src/+/lkgr/headless/README.md" time_added="1508254144" tags="">Headless Chromium</a></li>
<li><a href="https://paper.dropbox.com/doc/Sample-Brainstormd-zxdKyzHTKXndsj3r3uMPO#:uid=025897754212354422584959&amp;h2=Levels-/-Stages" time_added="1508253993" tags="">Sample: Brainstormd – Dropbox Paper</a></li>
<li><a href="https://github.com/mseclab/nathan" time_added="1507912914" tags="">https://github.com/mseclab/nathan</a></li>
<li><a href="http://blog.timac.org/?p=1570" time_added="1507912560" tags="">Timac » Blog Archive » Deobfuscating libMobileGestalt keys</a></li>
<li><a href="https://lolware.net/2015/04/28/nginx-fuzzing.html" time_added="1507912548" tags="">Fuzzing nginx - Hunting vulnerabilities with afl-fuzz</a></li>
<li><a href="https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html" time_added="1507912479" tags="">https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html</a></li>
<li><a href="https://www.bishopfox.com/blog/2015/05/rethinking-repackaging-ios-apps-part-2/" time_added="1507910801" tags="">Rethinking &amp; Repackaging iOS Apps: Part 2 - Bishop Fox</a></li>
<li><a href="https://www.bishopfox.com/blog/2015/02/rethinking-repackaging-ios-apps-part-1/" time_added="1507910776" tags="">Rethinking &amp; Repackaging iOS Apps: Part 1 - Bishop Fox</a></li>
<li><a href="https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/" time_added="1506731010" tags="">Android Applications Reversing 101 | Simone Margaritelli</a></li>
<li><a href="https://www.theverge.com/2017/4/24/15403644/microdosing-lsd-acid-productivity-benefits-brain-studies" time_added="1506731005" tags="">https://www.theverge.com/2017/4/24/15403644/microdosing-lsd-acid-productivity-benefits-brain-studies</a></li>
<li><a href="https://github.com/drduh/macOS-Security-and-Privacy-Guide/blob/master/README.md#dnsmasq" time_added="1506730996" tags="">https://github.com/drduh/macOS-Security-and-Privacy-Guide/blob/master/README.md#dnsmasq</a></li>
<li><a href="http://michenriksen.com/blog/aquatone-tool-for-domain-flyovers/" time_added="1506730306" tags="">http://michenriksen.com/blog/aquatone-tool-for-domain-flyovers/</a></li>
<li><a href="http://www.newyorker.com/tech/elements/zoe-quinns-depression-quest" time_added="1504231694" tags="">Zoe Quinn’s Depression Quest | The New Yorker</a></li>
<li><a href="https://qz.com/806516/the-secret-to-patagonias-success-keeping-moms-and-onsite-child-care-and-paid-parental-leave/" time_added="1503341029" tags="">The secret to Patagonia’s success? Keeping moms and onsite child care and p</a></li>
<li><a href="https://joeshaw.org/dont-defer-close-on-writable-files/" time_added="1498522925" tags="">Don’t defer Close() on writable files – joe shaw</a></li>
<li><a href="https://pocket.co/xMCypw?cta=1&amp;src=ph" time_added="1495655478" tags="">https://pocket.co/xMCypw?cta=1&amp;src=ph</a></li>
<li><a href="https://pocket.co/xMCyhn?cta=1&amp;src=ph" time_added="1495655424" tags="">https://pocket.co/xMCyhn?cta=1&amp;src=ph</a></li>
<li><a href="https://pocket.co/xMCypa?cta=1&amp;src=ph" time_added="1495654154" tags="">https://pocket.co/xMCypa?cta=1&amp;src=ph</a></li>
<li><a href="http://www.vox.com/2016/4/28/11518804/weight-loss-exercise-myth-burn-calories" time_added="1492804343" tags="">Why you shouldn&#039;t exercise to lose weight, explained with 60 studies - Vox</a></li>
<li><a href="https://blog.zsec.uk/pwning-pornhub/" time_added="1490129179" tags="bug bounty">Penetrating Pays: The Pornhub Story</a></li>
<li><a href="https://5haked.blogspot.com/2016/10/how-i-hacked-pornhub-for-fun-and-profit.html" time_added="1490129146" tags="bug bounty">5haked&#039;s research blog: How I hacked Pornhub for fun and profit - 10,000$</a></li>
<li><a href="https://newcircle.com/s/post/1292/jni_reference_example" time_added="1490072205" tags="">JNI Reference Example - NewCircle Training</a></li>
<li><a href="https://marcograss.github.io/security/apple/xpc/2016/06/17/containermanagerd-xpc-array-oob.html" time_added="1489628619" tags="">[CVE-2016-????] iOS containermanagerd XPC array out of bound vulnerability</a></li>
<li><a href="https://www.mikeash.com/pyblog/friday-qa-2009-01-16.html" time_added="1489628607" tags="">mikeash.com: Friday Q&amp;A 2009-01-16</a></li>
<li><a href="http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html?m=1" time_added="1489628554" tags="">http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html?m=1</a></li>
<li><a href="http://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things" time_added="1489628430" tags="">How to Build a Safer Internet of Things - IEEE Spectrum</a></li>
<li><a href="https://securitycafe.ro/2017/01/18/practical-jsonp-injection/" time_added="1489628333" tags="">Practical JSONP Injection – Security Café</a></li>
<li><a href="http://www.npr.org/sections/health-shots/2017/01/16/509353565/when-the-brain-scrambles-names-its-because-you-love-them?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1485532245" tags="">http://www.npr.org/sections/health-shots/2017/01/16/509353565/when-the-brain-scrambles-names-its-because-you-love-them?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://motherboard.vice.com/read/phineas-fisher-sme?utm_source=mbtwitter" time_added="1477805222" tags="">http://motherboard.vice.com/read/phineas-fisher-sme?utm_source=mbtwitter</a></li>
<li><a href="https://blog.skullsecurity.org/2015/how-i-nearly-almost-saved-the-internet-starring-afl-fuzz-and-dnsmasq" time_added="1477521982" tags="fuzzing">How I nearly almost saved the Internet, starring afl-fuzz and dnsmasq » Sku</a></li>
<li><a href="https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf" time_added="1477088761" tags="">DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool</a></li>
<li><a href="http://free-electrons.com/doc/network-drivers-lab.pdf" time_added="1476768899" tags="driver,linux">Linux network driver development - Lab book</a></li>
<li><a href="https://rstforums.com/forum/topic/101533-bypassing-chromes-xss-auditor/" time_added="1476768609" tags="">Bypassing Chromes XSS Auditor - Tutoriale in engleza - Romanian Security Te</a></li>
<li><a href="http://find-sec-bugs.github.io/bugs.htm#XSS_JSP_PRINT" time_added="1476768304" tags="java,xss">Bug Patterns - Find Security Bugs</a></li>
<li><a href="https://css-tricks.com/snippets/css/a-guide-to-flexbox/" time_added="1476768266" tags="css,web">A Complete Guide to Flexbox | CSS-Tricks</a></li>
<li><a href="http://struct.github.io/pdfium_partitionalloc.html" time_added="1476767795" tags="">Root Cause</a></li>
<li><a href="https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet" time_added="1476767306" tags="">How to Crash Systemd in One Tweet</a></li>
<li><a href="https://blog.zsec.uk/gif-time-pornhub/" time_added="1476492103" tags="bug bounty">gif it time it&#039;ll come to you - Finding More Holes in The Hub</a></li>
<li><a href="https://xorl.wordpress.com/2010/10/14/linux-glibc-stack-canary-values/" time_added="1476229308" tags="">Linux GLibC Stack Canary Values | xorl ?x, </a></li>
<li><a href="http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/" time_added="1476229300" tags="it,opsec,sysadmin">My First 10 Minutes On a Server - Primer for Securing Ubuntu</a></li>
<li><a href="https://labs.signalsciences.com/hacking-the-hard-way-at-the-derbycon-ctf-d35b4dd4c97d#.mvqxu0s18" time_added="1476229129" tags="">Hacking the Hard Way at the DerbyCon CTF</a></li>
<li><a href="https://backtrace.io/blog/blog/2016/04/22/elf-shared-library-injection-forensics/" time_added="1475376678" tags="">ELF Shared Library Injection Forensics - Backtrace I/O</a></li>
<li><a href="https://github.com/drduh/OS-X-Security-and-Privacy-Guide" time_added="1475376340" tags="">GitHub - drduh/OS-X-Security-and-Privacy-Guide: A practical guide to securi</a></li>
<li><a href="http://www.scientificamerican.com/article/how-to-raise-a-genius-lessons-from-a-45-year-study-of-supersmart-children/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1474765288" tags="">How to Raise a Genius: Lessons from a 45-Year Study of Supersmart Children </a></li>
<li><a href="http://www.newyorker.com/books/page-turner/the-book-that-taught-me-what-i-want-to-teach-my-daughter?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1474765234" tags="">The Book That Taught Me What I Want to Teach My Daughter - The New Yorker</a></li>
<li><a href="http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" time_added="1474387274" tags="exploit">MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html</a></li>
<li><a href="https://randomascii.wordpress.com/2016/09/16/everything-old-is-new-again-and-a-compiler-bug/" time_added="1474386857" tags="">https://randomascii.wordpress.com/2016/09/16/everything-old-is-new-again-and-a-compiler-bug/</a></li>
<li><a href="https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/" time_added="1473473946" tags="">How I Hacked an Android App to Get Free Beer</a></li>
<li><a href="https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/" time_added="1473473814" tags="">The Million Dollar Dissident: NSO Group&#039;s iPhone Zero-Days used against a U</a></li>
<li><a href="http://shiflett.org/blog/2006/jan/addslashes-versus-mysql-real-escape-string" time_added="1473473569" tags="sql injection,web">addslashes() Versus mysql_real_escape_string(), by Chris Shiflett</a></li>
<li><a href="https://room362.com/post/2016/snagging-creds-from-locked-machines/" time_added="1473473452" tags="">Snagging creds from locked machines · Room362</a></li>
<li><a href="http://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html" time_added="1473171195" tags="exploit,ios">PEGASUS iOS Kernel Vulnerability Explained | SektionEins GmbH</a></li>
<li><a href="https://sanctum.geek.nz/arabesque/actually-using-ed/" time_added="1471805269" tags="ed,exploit">Actually using ed | Arabesque</a></li>
<li><a href="https://www.polidea.com/blog/Protecting_iOS_Applications/" time_added="1468549139" tags="antireversing,ios">Protecting iOS Applications | Polidea</a></li>
<li><a href="https://c0nradsc0rner.wordpress.com/2016/06/17/xss-persistence-using-jsonp-and-serviceworkers" time_added="1468549033" tags="web,xss">https://c0nradsc0rner.wordpress.com/2016/06/17/xss-persistence-using-jsonp-and-serviceworkers</a></li>
<li><a href="https://blog.skullsecurity.org/2012/using-git-clone-to-get-pwn3d" time_added="1465925347" tags="">https://blog.skullsecurity.org/2012/using-git-clone-to-get-pwn3d</a></li>
<li><a href="http://drewspewsmuse.blogspot.de/2016/06/how-i-hacked-self-balancing-scooter.html?m=1" time_added="1465925224" tags="">http://drewspewsmuse.blogspot.de/2016/06/how-i-hacked-self-balancing-scooter.html?m=1</a></li>
<li><a href="http://pastebin.com/LhG6dJQv" time_added="1465925220" tags="">http://pastebin.com/LhG6dJQv</a></li>
<li><a href="http://arsiadi.net/2016/06/11/stories-of-xss-in-google-april-may-2016/" time_added="1465840933" tags="">http://arsiadi.net/2016/06/11/stories-of-xss-in-google-april-may-2016/</a></li>
<li><a href="http://bini.tech/google-stored-xss-es/" time_added="1465840871" tags="">http://bini.tech/google-stored-xss-es/</a></li>
<li><a href="https://blog.asdizzle.com/index.php/2016/04/22/ssrf-to-xss-to-csrf-to-rce-why-xss-is-dangerous/" time_added="1465840649" tags="web,xss">https://blog.asdizzle.com/index.php/2016/04/22/ssrf-to-xss-to-csrf-to-rce-why-xss-is-dangerous/</a></li>
<li><a href="https://developer.salesforce.com/page/Secure_Coding_Cross_Site_Scripting" time_added="1465687535" tags="web,xss">Secure Coding Cross Site Scripting - developer.force.com</a></li>
<li><a href="http://sijmen.ruwhof.net/weblog/937-how-i-found-a-huge-data-leak-of-a-company-during-a-college-lecture" time_added="1463500292" tags="">How I found a huge data leak of a company during a college lecture | Weblog</a></li>
<li><a href="http://paradoxcoffeeshop.com/" time_added="1463499860" tags="">Paradox</a></li>
<li><a href="http://nickcraver.com/blog/2016/02/17/stack-overflow-the-architecture-2016-edition/" time_added="1462033303" tags="">Nick Craver - Stack Overflow: The Architecture - 2016 Edition</a></li>
<li><a href="http://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/" time_added="1461626131" tags="">http://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</a></li>
<li><a href="http://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html?m=1" time_added="1461626120" tags="">http://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html?m=1</a></li>
<li><a href="https://github.com/mewrev/dissection" time_added="1461626100" tags="">mewrev/dissection: The dissection of a simple &quot;hello world&quot; ELF file.</a></li>
<li><a href="http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/" time_added="1461599412" tags="">How I Hacked Facebook, and Found Someone&#039;s Backdoor Script | DEVCORE 戴夫寇爾</a></li>
<li><a href="https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/" time_added="1461205133" tags="">https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/</a></li>
<li><a href="http://big-daddy.fr/repository/Documentation/Hacking/Security/Malware/Rootkits/injection-via-dev-mem.pdf" time_added="1460556680" tags="">big-daddy.fr/repository/Documentation/Hacking/Security/Malware/Rootkits/inj</a></li>
<li><a href="http://0x36.blogspot.com/2014/06/sigreturn-rop-exploitation-technique.html" time_added="1460556404" tags="">simo36&#039;s Blog: Sigreturn ROP exploitation technique (signal&#039;s stack frame f</a></li>
<li><a href="http://danmcinerney.org/reliable-dns-spoofing-with-python-scapy-nfqueue/" time_added="1460556302" tags="">Reliable DNS spoofing with Python: Scapy Nfqueue pt. 1 | Dan McInerney</a></li>
<li><a href="https://guidovranken.wordpress.com/" time_added="1460556292" tags="">https://guidovranken.wordpress.com/</a></li>
<li><a href="http://blogs.technet.com/b/srd/archive/2016/01/12/triaging-the-exploitability-of-ie-edge-crashes.aspx" time_added="1460556153" tags="">http://blogs.technet.com/b/srd/archive/2016/01/12/triaging-the-exploitability-of-ie-edge-crashes.aspx</a></li>
<li><a href="http://www.miasm.re/blog/2016/01/27/re150.html" time_added="1460556121" tags="">http://www.miasm.re/blog/2016/01/27/re150.html</a></li>
<li><a href="http://www.davidlitchfield.com/ExploitingtheOracleWorkspaceManagerSQLRaceCondition.pdf" time_added="1460332788" tags="">http://www.davidlitchfield.com/ExploitingtheOracleWorkspaceManagerSQLRaceCondition.pdf</a></li>
<li><a href="http://travisdazell.blogspot.com/2012/11/many-time-pad-attack-crib-drag.html" time_added="1460332725" tags="">Travis Dazell: Many Time Pad Attack - Crib Drag</a></li>
<li><a href="http://pythonsweetness.tumblr.com/post/64740079543/how-to-lose-172222-a-second-for-45-minutes" time_added="1460332575" tags="">http://pythonsweetness.tumblr.com/post/64740079543/how-to-lose-172222-a-second-for-45-minutes</a></li>
<li><a href="http://www.mathyvanhoef.com/2013/02/understanding-heap-exploiting-heap.html" time_added="1459970630" tags="">Mathy Vanhoef: Understanding the Heap &amp; Exploiting Heap Overflows</a></li>
<li><a href="https://github.com/ctfs/write-ups-2014/blob/a0c08f898261cd1bd2deeaf03df892d7001b594d/asis-ctf-finals-2014/numdroid/README.md" time_added="1459885084" tags="android,ctf">write-ups-2014/README.md at a0c08f898261cd1bd2deeaf03df892d7001b594d · ctfs</a></li>
<li><a href="http://cturt.github.io/DS-exploit-finding.html" time_added="1459316316" tags="">http://cturt.github.io/DS-exploit-finding.html</a></li>
<li><a href="https://hbr.org/2015/07/create-a-conversation-not-a-presentation?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1459051066" tags="">https://hbr.org/2015/07/create-a-conversation-not-a-presentation?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://blog.exodusintel.com/2013/11/26/browser-weakest-byte/#Crashing" time_added="1459018041" tags="exploit,ie">A browser is only as strong as its weakest byte | Exodus Intelligence</a></li>
<li><a href="http://www.theguardian.com/technology/2016/jan/28/death-of-a-troll?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1459017979" tags="">Death of a troll | Alina Simone | Technology | The Guardian</a></li>
<li><a href="http://www.contrib.andrew.cmu.edu/~somlo/OSXKVM/" time_added="1458967490" tags="">Running Mac OS X as a QEMU/KVM Guest</a></li>
<li><a href="http://fumalwareanalysis.blogspot.in/p/malware-analysis-tutorials-reverse.html" time_added="1458966039" tags="">http://fumalwareanalysis.blogspot.in/p/malware-analysis-tutorials-reverse.html</a></li>
<li><a href="http://vxheaven.org/lib/vsc01.html" time_added="1458936254" tags="">Silvio Cesare &#039;Unix ELF parasites and virus&#039; (VX heaven)</a></li>
<li><a href="https://reverse.put.as/2016/01/22/reversing-apples-syslogd-bug/" time_added="1457627696" tags="">https://reverse.put.as/2016/01/22/reversing-apples-syslogd-bug/</a></li>
<li><a href="https://xairy.github.io/blog/2016/cve-2016-2384" time_added="1457314157" tags="">https://xairy.github.io/blog/2016/cve-2016-2384</a></li>
<li><a href="http://www.thespanner.co.uk/2013/05/16/dom-clobbering/" time_added="1457099993" tags="">DOM Clobbering</a></li>
<li><a href="http://pocket.co/soC6gF?cta=1" time_added="1456726746" tags="">http://pocket.co/soC6gF?cta=1</a></li>
<li><a href="https://samples.ffmpeg.org/image-samples/" time_added="1456595353" tags="">Index of /image-samples</a></li>
<li><a href="https://docs.google.com/document/d/1I_-ZKo___AaI5kkE1LVmmWNNEFYzBRNdochKv9R6_lM/edit" time_added="1456594891" tags="">Intro to Newsgroups - Google Docs</a></li>
<li><a href="http://pocket.co/soC6ld?cta=1" time_added="1456370756" tags="">http://pocket.co/soC6ld?cta=1</a></li>
<li><a href="https://wiki.python.org/moin/Powerful%20Python%20One-Liners" time_added="1456121061" tags="">Powerful Python One-Liners - Python Wiki</a></li>
<li><a href="https://www.fireeye.com/blog/threat-research/2015/01/flare_ida_pro_script.html" time_added="1456108883" tags="">FLARE IDA Pro Script Series: Generating FLAIR function patterns using IDAPy</a></li>
<li><a href="http://travisgoodspeed.blogspot.com/2012/10/emulating-usb-dfu-to-capture-firmware.html" time_added="1456108872" tags="">Travis Goodspeed&#039;s Blog: Emulating USB DFU to Capture Firmware</a></li>
<li><a href="https://jon.oberheide.org/files/half-nelson.c" time_added="1456108464" tags="">https://jon.oberheide.org/files/half-nelson.c</a></li>
<li><a href="http://www.kaizendo.fr/php-how-to-manage-uploaded-image-in-secure-way/" time_added="1456103173" tags="">[php] How to manage uploaded images in secure way | Kaizendo.fr</a></li>
<li><a href="https://cyseclabs.com/page?n=17012016" time_added="1456087781" tags="">https://cyseclabs.com/page?n=17012016</a></li>
<li><a href="https://github.com/gdbinit/mpress_dumper" time_added="1456027519" tags="">gdbinit/mpress_dumper</a></li>
<li><a href="https://blogs.oracle.com/dns/entry/understanding_the_authorization_framework_on" time_added="1456027508" tags="">Using task_for_pid on Mac OS X (Doug&#039;s Note System)</a></li>
<li><a href="https://github.com/GNOME/evince/tree/master/backend/djvu" time_added="1456027469" tags="">evince/backend/djvu at master · GNOME/evince</a></li>
<li><a href="http://www.codereversing.com/blog/archives/282" time_added="1456027459" tags="">RCE Endeavors » Runtime DirectX Hooking</a></li>
<li><a href="http://nautil.us/issue/32/space/how-to-survive-solitary-confinement?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1455502843" tags="">How Would You Do in Supermax? The Answer May Lie with Imagination and Grit</a></li>
<li><a href="http://web.textfiles.com/ezines/ZF0/" time_added="1455286239" tags="">T E X T F I L E S</a></li>
<li><a href="https://avicoder.me/2016/02/01/smashsatck-revived/" time_added="1455286233" tags="">https://avicoder.me/2016/02/01/smashsatck-revived/</a></li>
<li><a href="https://github.com/gdbinit/onyx-the-black-cat" time_added="1454901578" tags="">gdbinit/onyx-the-black-cat: Kernel extension to disable anti-debug tricks a</a></li>
<li><a href="http://www.newyorker.com/culture/cultural-comment/everyone-hates-martin-shkreli-everyone-is-missing-the-point?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1454865782" tags="">Everyone Hates Martin Shkreli. Everyone Is Missing the Point - The New York</a></li>
<li><a href="https://matt.sh/howto-c" time_added="1454865078" tags="">How to C (as of 2016)</a></li>
<li><a href="https://memset.wordpress.com/2010/12/03/syscall-hijacking-kernel-2-6-systems/" time_added="1453423851" tags="">Syscall Hijacking: Kernel 2.6.* systems | memset&#039;s blog</a></li>
<li><a href="http://c.learncodethehardway.org/book/ex20.html" time_added="1453423820" tags="c,programming">Learn C The Hard Way</a></li>
<li><a href="http://fluxius.handgrep.se/2011/10/20/the-art-of-elf-analysises-and-exploitations/" time_added="1453226338" tags="elf,format">The Art Of ELF: Analysis and Exploitations | FlUxIuS&#039; Blog</a></li>
<li><a href="http://ha.ckers.org/blog/category/random-security/" time_added="1451099363" tags="">http://ha.ckers.org/blog/category/random-security/</a></li>
<li><a href="http://blog.scrt.ch/2015/03/27/insomnihack-finals-insomnidroid-level-1-writeup/" time_added="1451098552" tags="">Insomni’hack finals – InsomniDroid Level 1 Writeup | SCRT Sec Team blog</a></li>
<li><a href="http://www.raywenderlich.com/90488/calayer-in-ios-with-swift-10-examples" time_added="1451098523" tags="">http://www.raywenderlich.com/90488/calayer-in-ios-with-swift-10-examples</a></li>
<li><a href="https://forum.reverse4you.org/showthread.php?t=2258" time_added="1451098313" tags="">https://forum.reverse4you.org/showthread.php?t=2258</a></li>
<li><a href="http://poppopret.org/2013/12/18/reverse-engineering-a-furby/" time_added="1450935483" tags="">Reverse Engineering a Furby | Michael Coppola&#039;s Blog</a></li>
<li><a href="http://www.artofmanliness.com/2015/11/02/the-power-of-conversation-a-lesson-from-cs-lewis-and-jrr-tolkien/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1450290353" tags="">http://www.artofmanliness.com/2015/11/02/the-power-of-conversation-a-lesson-from-cs-lewis-and-jrr-tolkien/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="https://www.duosecurity.com/blog/wow64-and-so-can-you" time_added="1449769000" tags="">https://www.duosecurity.com/blog/wow64-and-so-can-you</a></li>
<li><a href="https://gist.github.com/kholia/5807150" time_added="1449610877" tags="">Notes on ASLR and vsyscall page · GitHub</a></li>
<li><a href="http://researchcenter.paloaltonetworks.com/2014/12/google-chrome-exploitation-case-study/" time_added="1449610857" tags="">Google Chrome Exploitation – A Case Study - Palo Alto Networks BlogPalo Alt</a></li>
<li><a href="http://blog.stalkr.net/2015/12/from-remote-shell-to-remote-terminal.html?m=1" time_added="1449610838" tags="">http://blog.stalkr.net/2015/12/from-remote-shell-to-remote-terminal.html?m=1</a></li>
<li><a href="http://rotlogix.com/2015/11/19/inspecting-heap-objects-with-lldb/" time_added="1448766258" tags="">http://rotlogix.com/2015/11/19/inspecting-heap-objects-with-lldb/</a></li>
<li><a href="http://nusgreyhats.org/write-ups/HITCONCTF-Quals-2015-Simple-(Crypto-100)/" time_added="1448584867" tags="">HITCON CTF Quals 2015 - Simple (Crypto 100) – NUS Greyhats</a></li>
<li><a href="http://www.muppetlabs.com/~breadbox/software/tiny/teensy.html" time_added="1446488697" tags="">A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux</a></li>
<li><a href="https://kitctf.de/writeups/plaidctf-2015/tp/" time_added="1446488691" tags="">PlaidCTF 2015 - TP writeup</a></li>
<li><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2014/march/rits-ists-mobile-challenge/" time_added="1445868225" tags="">RIT’s ISTS Mobile Challenge</a></li>
<li><a href="https://marc-stevens.nl/p/hashclash/" time_added="1445868221" tags="">Project HashClash - Project HashClash</a></li>
<li><a href="https://github.com/ByteBandits/writeups/tree/master/hack.lu-ctf-2015/exploiting/Stackstuff/sudhackar" time_added="1445741586" tags="">writeups/hack.lu-ctf-2015/exploiting/Stackstuff/sudhackar at master · ByteB</a></li>
<li><a href="https://www.brainpickings.org/2015/10/23/nine-years-of-brain-pickings/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1445741573" tags="">https://www.brainpickings.org/2015/10/23/nine-years-of-brain-pickings/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://m.nautil.us/issue/29/scaling/metaphors-are-us-rp?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1445740922" tags="">http://m.nautil.us/issue/29/scaling/metaphors-are-us-rp?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://benkurtovic.com/2014/06/01/obfuscating-hello-world.html" time_added="1445402302" tags="">Obfuscating &quot;Hello world!&quot; - Ben Kurtovic</a></li>
<li><a href="http://beginners.re/Reverse_Engineering_for_Beginners-en.pdf" time_added="1445401955" tags="">beginners.re/Reverse_Engineering_for_Beginners-en.pdf</a></li>
<li><a href="https://blogs.oracle.com/ali/entry/inside_elf_symbol_tables" time_added="1445401936" tags="">Inside ELF Symbol Tables (Ali Bahrami)</a></li>
<li><a href="http://pastebin.com/heYvWu5Y" time_added="1445401675" tags="">8chan XSS/imgur breach - Pastebin.com</a></li>
<li><a href="http://montgomeryschoolsmd.org/uploadedFiles/schools/poolems/newsletter/03-12-10BackPocket.pdf" time_added="1445401669" tags="">montgomeryschoolsmd.org/uploadedFiles/schools/poolems/newsletter/03-12-10Ba</a></li>
<li><a href="https://beacon.nist.gov/home" time_added="1445401656" tags="">NIST Randomness Beacon (Prototype Implementation) - NIST</a></li>
<li><a href="http://beej.us/guide/bgnet/output/html/multipage/index.html" time_added="1444600813" tags="">Beej&#039;s Guide to Network Programming</a></li>
<li><a href="http://depier.re/let_s_try_radare2/" time_added="1444600801" tags="">depier.re - Let&#039;s try Radare2</a></li>
<li><a href="https://www.mdsec.co.uk/2015/09/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/" time_added="1444600634" tags="">An Introduction to Hardware Hacking: the RIPE Atlas probe | MDSec</a></li>
<li><a href="http://0x0atang.github.io/reversing/2015/09/17/flareon2-concolic.html" time_added="1444600329" tags="">· Adrian Tang · | Smashing Flare-On #2 with Concolic Testing</a></li>
<li><a href="http://githubengineering.com/counting-objects/" time_added="1444600272" tags="">http://githubengineering.com/counting-objects/</a></li>
<li><a href="http://blog.dragonsector.pl/2014/03/ructf-2014-quals-tls-crypto-300.html?m=1" time_added="1444600267" tags="">http://blog.dragonsector.pl/2014/03/ructf-2014-quals-tls-crypto-300.html?m=1</a></li>
<li><a href="http://haacked.com/archive/2008/11/20/anatomy-of-a-subtle-json-vulnerability.aspx/" time_added="1440605438" tags="">http://haacked.com/archive/2008/11/20/anatomy-of-a-subtle-json-vulnerability.aspx/</a></li>
<li><a href="https://shankaraman.wordpress.com/category/ctf/" time_added="1440432407" tags="">https://shankaraman.wordpress.com/category/ctf/</a></li>
<li><a href="http://learnyouahaskell.com/introduction#about-this-tutorial" time_added="1439103751" tags="">http://learnyouahaskell.com/introduction#about-this-tutorial</a></li>
<li><a href="http://learnyouahaskell.com/starting-out" time_added="1439103747" tags="">http://learnyouahaskell.com/starting-out</a></li>
<li><a href="http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pdf" time_added="1438813114" tags="">www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pd</a></li>
<li><a href="http://www.cis.syr.edu/~wedu/seed/" time_added="1438139945" tags="">http://www.cis.syr.edu/~wedu/seed/</a></li>
<li><a href="http://teaching.idallen.com/dat2343/10f/notes/040_overflow.txt" time_added="1438021969" tags="">teaching.idallen.com/dat2343/10f/notes/040_overflow.txt</a></li>
<li><a href="https://www.youtube.com/watch?v=td1KEUhlSuk" time_added="1437857150" tags="">livectf REDEMPTION by geohot 7/27/2014 - YouTube</a></li>
<li><a href="http://radare.org/doc/html/contents.html" time_added="1437857147" tags="">radare</a></li>
<li><a href="http://googleprojectzero.blogspot.com" time_added="1437857145" tags="">http://googleprojectzero.blogspot.com</a></li>
<li><a href="http://blog.gdssecurity.com/labs/2010/10/6/crypto-challenges-at-the-csaw-2010-application-ctf-qualifyin.html" time_added="1437857138" tags="">GDS - Blog - Crypto Challenges at the CSAW 2010 Application CTF Qualifying </a></li>
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-03.html?m=0" time_added="1437857134" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-03.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/04/abandoned-part-02.html?m=0" time_added="1437857134" tags="exploit,router">http://shadow-file.blogspot.com/2015/04/abandoned-part-02.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-04.html?m=0" time_added="1437857133" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-04.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-05.html?m=0" time_added="1437857132" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-05.html?m=0</a></li>
<li><a href="http://blog.gdssecurity.com/labs/2010/9/14/automated-padding-oracle-attacks-with-padbuster.html" time_added="1437856279" tags="cryptography,padding oracle">GDS - Blog - Automated Padding Oracle Attacks with PadBuster</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-part-08.html?m=0" time_added="1437856076" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-part-08.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-intermission.html?m=0" time_added="1437856075" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-intermission.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/06/abandoned-part-07.html?m=0" time_added="1437856073" tags="exploit,router">http://shadow-file.blogspot.com/2015/06/abandoned-part-07.html?m=0</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/05/abandoned-part-06.html?m=0" time_added="1437856071" tags="exploit,router">http://shadow-file.blogspot.com/2015/05/abandoned-part-06.html?m=0</a></li>
<li><a href="http://t-a-w.blogspot.com/2007/03/how-to-code-debuggers.html" time_added="1437855991" tags="c,debugger">taw&#039;s blog: How to code debuggers</a></li>
<li><a href="http://time.com/3955673/ant-man-paul-rudd-ants/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1437855970" tags="">http://time.com/3955673/ant-man-paul-rudd-ants/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits</a></li>
<li><a href="http://www.reteam.org/challenges.html" time_added="1437855919" tags="challenge,reverse">Reverse Engineering Team</a></li>
<li><a href="http://securityevaluators.com/knowledge/papers/engineeringheapoverflow.pdf" time_added="1437855889" tags="exploitation,heap">securityevaluators.com/knowledge/papers/engineeringheapoverflow.pdf</a></li>
<li><a href="http://files.accuvant.com/web/file/4a2a88cc7dec477096b88e19eba57969/White Paper- pwn2own_2013__java_7_se_memory_corruption.pdf" time_added="1437855786" tags="exploitation,java">http://files.accuvant.com/web/file/4a2a88cc7dec477096b88e19eba57969/White Paper- pwn2own_2013__java_7_se_memory_corruption.pdf</a></li>
<li><a href="https://srlabs.de/blog/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec-v2.pdf" time_added="1437854750" tags="usb">https://srlabs.de/blog/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec-v2.p</a></li>
<li><a href="http://theamazingking.com/crypto-linear.php" time_added="1437854613" tags="cryptography">The Amazing King - Linear Cryptanalysis Tutorial</a></li>
<li><a href="http://blog.ioactive.com/2015/07/differential-cryptanalysis-for-dummies.html?m=1" time_added="1437854600" tags="cryptography">http://blog.ioactive.com/2015/07/differential-cryptanalysis-for-dummies.html?m=1</a></li>
<li><a href="http://www.monocacymonocle.com/images/issues_2010/MM_2010-04-16.pdf" time_added="1437854036" tags="me">http://www.monocacymonocle.com/images/issues_2010/MM_2010-04-16.pdf</a></li>
<li><a href="http://getpocket.com/s/oPyNL?cta=1" time_added="1437848978" tags="">http://getpocket.com/s/oPyNL?cta=1</a></li>
<li><a href="https://ryiron.wordpress.com/2013/09/05/kptr_restrict-finding-kernel-symbols-for-shell-code/" time_added="1437616157" tags="kernel,linux,shellcode">kptr_restrict – Finding kernel symbols for shell code | ~ryiron</a></li>
<li><a href="http://www.phreedom.org/research/heap-feng-shui/heap-feng-shui.html" time_added="1437578501" tags="">Heap Feng Shui in JavaScript</a></li>
<li><a href="http://blog.quarkslab.com/turning-regular-code-into-atrocities-with-llvm.html" time_added="1437543981" tags="fuzzing,llvm">Turning Regular Code Into Atrocities With LLVM</a></li>
<li><a href="http://seclists.org/bugtraq/2012/Feb/178" time_added="1437543926" tags="">Bugtraq: Reliable Windows 7 Exploitation: A Case Study</a></li>
<li><a href="http://llvm.org/docs/LibFuzzer.html#heartbleed" time_added="1437285385" tags="fuzzing">LibFuzzer – a library for coverage-guided fuzz testing. — LLVM 3.8 document</a></li>
<li><a href="http://ifsec.blogspot.com/2011/06/memory-disclosure-technique-for.html" time_added="1437160647" tags="browser,disclosure,technique">Ivan Fratric&#039;s Security Blog: Memory disclosure technique for Internet Expl</a></li>
<li><a href="http://www.wilfred.me.uk/blog/2015/02/21/my-first-llvm-compiler/" time_added="1437160404" tags="fuzzing">My First LLVM Compiler | Wilfred Hughes :: Blog</a></li>
<li><a href="http://resources.infosecinstitute.com/cbc-byte-flipping-attack-101-approach/" time_added="1437159308" tags="cbc,crypto,encryption">CBC Byte Flipping Attack—101 Approach - InfoSec Institute</a></li>
<li><a href="http://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/" time_added="1437159169" tags="">How We Fared in the Cyber Grand Challenge – Trail of Bits Blog</a></li>
<li><a href="https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-WP.pdf" time_added="1436811233" tags="fonts,fuzzing">https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-WP.pd</a></li>
<li><a href="https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-WP.pdf" time_added="1436811232" tags="font,fuzzing">https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine</a></li>
<li><a href="https://cansecwest.com/csw11/Borken%20Fonts%20-%20Schoenefeld.pdf" time_added="1436811231" tags="fonts,fuzzing">https://cansecwest.com/csw11/Borken Fonts - Schoenefeld.pdf</a></li>
<li><a href="http://blog.azimuthsecurity.com/2013/02/re-visiting-exynos-memory-mapping-bug.html" time_added="1436395354" tags="android,root">Azimuth Security: Re-visiting the Exynos Memory Mapping Bug</a></li>
<li><a href="https://blog.coresecurity.com/2015/03/25/exploiting-cve-2015-0311-part-ii-bypassing-control-flow-guard-on-windows-8-1-update-3/" time_added="1436395105" tags="exploit,mitigation,windows">Bypassing Control Flow Guard on Windows 8.1 | Core Security Blog</a></li>
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301" time_added="1436334285" tags="ctf,heap">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301</a></li>
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299" time_added="1436334285" tags="ctf,heap">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299</a></li>
<li><a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-SQL-Injection-Challenge--Lessons-Learned/" time_added="1436334269" tags="sql injection,web">ModSecurity SQL Injection Challenge: Lessons Learned</a></li>
<li><a href="http://dustri.org/b/defeating-ioli-with-radare2.html" time_added="1436334257" tags="radare">http://dustri.org/b/defeating-ioli-with-radare2.html</a></li>
<li><a href="http://radare.today/radare2-is-documented/" time_added="1436334256" tags="radare">http://radare.today/radare2-is-documented/</a></li>
<li><a href="http://0xax.gitbooks.io/linux-insides/content/index.html" time_added="1436334005" tags="linux">Introduction | linux-insides</a></li>
<li><a href="http://googleprojectzero.blogspot.de/2014/11/pwn4fun-spring-2014-safari-part-ii.html" time_added="1436333957" tags="browser,exploit,safari">Project Zero: pwn4fun Spring 2014 - Safari - Part II</a></li>
<li><a href="http://blog.ioactive.com/2012/12/striking-back-gdb-and-ida-debuggers.html" time_added="1436333936" tags="antireversing,elf,gdb,ida">IOActive Labs Research: Striking Back GDB and IDA debuggers through malform</a></li>
<li><a href="http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html" time_added="1436333877" tags="arm,ctf">Mathy Vanhoef: Reversing and Exploiting ARM Binaries: rwthCTF Trafman</a></li>
<li><a href="http://gaasedelen.blogspot.com/2014/11/landing-agres-links-500-csaw-ctf-2014.html" time_added="1436333856" tags="ctf windows">Landing Agre&#039;s Links 500 - CSAW CTF 2014 Finals | Bigger Than Bytes</a></li>
<li><a href="http://felixcloutier.com/greenhorn/" time_added="1436333849" tags="ctf,windows">Greenhorn–the anatomy of a Windows 8 program exploit</a></li>
<li><a href="http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/" time_added="1436333840" tags="hardware,re,router">http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/</a></li>
<li><a href="https://kitctf.de/writeups/0ctf2015/freenote/" time_added="1436333827" tags="ctf,heap">https://kitctf.de/writeups/0ctf2015/freenote/</a></li>
<li><a href="http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/" time_added="1436333809" tags="symbolic execution,z3">http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/</a></li>
<li><a href="http://nest.unm.edu/files/5514/1254/9114/Malware_Analysis_with_Vivsect.pdf" time_added="1436333779" tags="malware,vdb">nest.unm.edu/files/5514/1254/9114/Malware_Analysis_with_Vivsect.pdf</a></li>
<li><a href="https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-atlas.pdf" time_added="1436333767" tags="debug,vdb">https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-atlas.</a></li>
<li><a href="http://lar5.com/cube/" time_added="1436333745" tags="cube">http://lar5.com/cube/</a></li>
<li><a href="https://intrepidusgroup.com/insight/2014/03/rits-ists-mobile-challenge/" time_added="1436333731" tags="android,challenge,ctf">https://intrepidusgroup.com/insight/2014/03/rits-ists-mobile-challenge/</a></li>
<li><a href="http://acko.net/blog/animate-your-way-to-glory/" time_added="1436333719" tags="javascript">http://acko.net/blog/animate-your-way-to-glory/</a></li>
<li><a href="https://www.alchemistowl.org/pocorgtfo/pocorgtfo06.pdf" time_added="1436333584" tags="pocgtfo">pocorgtfo06.pdf</a></li>
<li><a href="https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf" time_added="1436333482" tags="browser,mitigations">Bypassing Browser Memory Protections - bh08-sotirov-dowd.pdf</a></li>
<li><a href="http://munkschool.utoronto.ca/canadacentre/research/backdoors-are-forever/" time_added="1436333465" tags="backdoor">Backdoors are Forever: Hacking Team and the Targeting of Dissent? | Canada </a></li>
<li><a href="http://vulnfactory.org/exploits/full-nelson.c" time_added="1436333404" tags="exploit,kernel,linux">vulnfactory.org/exploits/full-nelson.c</a></li>
<li><a href="http://www.theatlantic.com/magazine/archive/2015/07/world-without-work/395294/?utm_source=pocket&amp;utm_medium=email&amp;utm_campaign=pockethits" time_added="1436333377" tags="">A World Without Work - The Atlantic</a></li>
<li><a href="http://users.ics.forth.gr/~elathan/papers/ndss15.pdf" time_added="1436333328" tags="browser,bypass,mitigation">users.ics.forth.gr/~elathan/papers/ndss15.pdf</a></li>
<li><a href="http://seclists.org/oss-sec/2015/q3/25" time_added="1436333309" tags="exploit,kernel,linux">http://seclists.org/oss-sec/2015/q3/25</a></li>
<li><a href="https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/" time_added="1436333242" tags="linux,tutorial">https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/</a></li>
<li><a href="http://www.anti-reversing.com/cve-2015-1438/" time_added="1436333229" tags="exploit">The A.R.F Project© » CVE-2015-1438 – Panda Security Multiple Products Arbit</a></li>
<li><a href="http://repo.hackerzvoice.net/depot_madchat/vxdevl/papers/winsys/pefile/pefile.htm" time_added="1436333161" tags="elf,format">PE File Structure</a></li>
<li><a href="http://flint.cs.yale.edu/cs422/doc/ELF_Format.pdf" time_added="1436333077" tags="elf,format">flint.cs.yale.edu/cs422/doc/ELF_Format.pdf</a></li>
<li><a href="https://beistlab.files.wordpress.com/2012/10/isec_2012_beist_slides.pdf" time_added="1436333058" tags="bug hunting,vulnerabilities">https://beistlab.files.wordpress.com/2012/10/isec_2012_beist_slides.pdf</a></li>
<li><a href="http://expdev-kiuhnm.rhcloud.com/2015/05/11/contents/" time_added="1436332974" tags="exploit,tutorial,windows">Contents - Exploit Development Community</a></li>
<li><a href="http://blog.silentsignal.eu/" time_added="1436332926" tags="pentesting,web">Silent Signal Techblog | Because we can!</a></li>
<li><a href="https://code.google.com/p/google-security-research/issues/detail?id=364#c3" time_added="1436332889" tags="browser,chrome,exploit">Issue 364 - google-security-research - Chrome heap overflow in CertificateR</a></li>
<li><a href="https://drive.google.com/file/d/0Bxvv8gduedamTEJCUlN6eERtWUE/view" time_added="1436332868" tags="browser,c++,chrome,exploit">Detect Bad-Casting at Runtime with Undefined Sanitizer.pdf - Google Drive</a></li>
<li><a href="https://code.google.com/p/chromium/issues/attachmentText?id=35724&amp;aid=126993484832405244&amp;name=Pwnium-1.3.html&amp;token=feb53c401c565218ebbb4e57977988f2" time_added="1436332867" tags="browser,chrome,exploit">Pwnium-1.3.html (59.3 KB) - chromium - An open-source project to help move </a></li>
<li><a href="http://dl.aircrack-ng.org/breakingwepandwpa.pdf" time_added="1436318136" tags="project,wep,wifi">dl.aircrack-ng.org/breakingwepandwpa.pdf</a></li>
<li><a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt" time_added="1435594899" tags="exploit,hacknight,linux">https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt</a></li>
<li><a href="https://rh0dev.github.io/blog/2015/fun-with-info-leaks/" time_added="1435537066" tags="exploit,ie">Fun With Info-Leaks - </a></li>
<li><a href="http://fr.slideshare.net/hibouchinois/wp8-49181967" time_added="1435537063" tags="exploit,phone">Wp8</a></li>
<li><a href="https://nakedsecurity.sophos.com/2013/10/11/anatomy-of-an-exploit-ie-zero-day-part-1/" time_added="1435537057" tags="exploit,ie">Anatomy of an exploit – inside the CVE-2013-3893 Internet Explorer zero-day</a></li>
<li><a href="http://shadow-file.blogspot.com/2015/04/abandoned-part-01.html" time_added="1435194917" tags="exploit,router">http://shadow-file.blogspot.com/2015/04/abandoned-part-01.html</a></li>
<li><a href="https://github.com/0vercl0k/z3-playground/blob/master/solve_nsc2014_step1_z3.py" time_added="1435189445" tags="">https://github.com/0vercl0k/z3-playground/blob/master/solve_nsc2014_step1_z3.py</a></li>
<li><a href="https://ctf-team.vulnhub.com/hack-dot-lu-2014-the-union/" time_added="1435189440" tags="">https://ctf-team.vulnhub.com/hack-dot-lu-2014-the-union/</a></li>
<li><a href="http://www.singlehop.com/blog/binary-vivisection-part-1/" time_added="1435189420" tags="">Binary Vivisection (Part 1) | SingleHop</a></li>
<li><a href="http://doar-e.github.io/blog/2013/09/16/breaking-kryptonites-obfuscation-with-symbolic-execution/" time_added="1435189413" tags="">http://doar-e.github.io/blog/2013/09/16/breaking-kryptonites-obfuscation-with-symbolic-execution/</a></li>
<li><a href="http://wiki.yobi.be/wiki/Reverse-Engineering#QIRA" time_added="1435189397" tags="">Reverse-Engineering - YobiWiki</a></li>
<li><a href="http://mslc.ctf.su/wp/codegate-2014-quals-angry-doraemon-pwn-250/" time_added="1435014841" tags="">http://mslc.ctf.su/wp/codegate-2014-quals-angry-doraemon-pwn-250/</a></li>
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1076" time_added="1435014820" tags="">http://ppp.cylab.cmu.edu/wordpress/?p=1076</a></li>
<li><a href="https://pentest.com/ios_backdoors_attack_points_surveillance_mechanisms.pdf" time_added="1435014811" tags="">https://pentest.com/ios_backdoors_attack_points_surveillance_mechanisms.pdf</a></li>
<li><a href="http://www.embedded.com/electronics-blogs/cole-bin/4438476/The-challenges-of-printed-circuit-board-design-and-debug" time_added="1435014228" tags="">http://www.embedded.com/electronics-blogs/cole-bin/4438476/The-challenges-of-printed-circuit-board-design-and-debug</a></li>
<li><a href="http://troydhanson.github.io/misc/bloom.html" time_added="1435014212" tags="">http://troydhanson.github.io/misc/bloom.html</a></li>
<li><a href="http://powerofcommunity.net/poc2014/tombkeeper.pdf" time_added="1435014096" tags="">http://powerofcommunity.net/poc2014/tombkeeper.pdf</a></li>
<li><a href="https://cansecwest.com/slides/2014/ROPs_are_for_the_99_CanSecWest_2014.pdf" time_added="1435014081" tags="">https://cansecwest.com/slides/2014/ROPs_are_for_the_99_CanSecWest_2014.pdf</a></li>
<li><a href="https://www.blackhat.com/docs/us-14/materials/us-14-Yu-Write-Once-Pwn-Anywhere.pdf" time_added="1435014073" tags="">https://www.blackhat.com/docs/us-14/materials/us-14-Yu-Write-Once-Pwn-Anywhere.pdf</a></li>
<li><a href="https://www.openssl.org/~bodo/ssl-poodle.pdf" time_added="1434895505" tags="">https://www.openssl.org/~bodo/ssl-poodle.pdf</a></li>
<li><a href="https://www.exploit-db.com/papers/17167/" time_added="1434866864" tags="">https://www.exploit-db.com/papers/17167/</a></li>
<li><a href="https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html" time_added="1433977171" tags="chromecast,exploit,hardware">https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html</a></li>
<li><a href="http://radare.today/solving-at-gunpoint-from-hack-lu-2014-with-radare2/" time_added="1433010439" tags="ctf,gba,radare">http://radare.today/solving-at-gunpoint-from-hack-lu-2014-with-radare2/</a></li>
<li><a href="https://cseweb.ucsd.edu/~hovav/dist/tex-login.pdf" time_added="1432103193" tags="exploit,latex,whitepaper">https://cseweb.ucsd.edu/~hovav/dist/tex-login.pdf</a></li>
<li><a href="http://radare.today/visual-mode/" time_added="1432102790" tags="radare">Visual mode</a></li>
<li><a href="http://cseweb.ucsd.edu/~hovav/dist/geometry.pdf" time_added="1432102743" tags="">cseweb.ucsd.edu/~hovav/dist/geometry.pdf</a></li>
<li><a href="http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html?m=1" time_added="1431391969" tags="collision,hash,md5">http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html?m=1</a></li>
<li><a href="http://theiphonewiki.com/wiki/Limera1n_Exploit" time_added="1430954442" tags="apple,exploit">http://theiphonewiki.com/wiki/Limera1n_Exploit</a></li>
<li><a href="https://www.nowsecure.com/blog/2013/10/02/chained-vulnerabilities-firefox-android-pimp-browser/" time_added="1430890200" tags="android,exploit,firefox">https://www.nowsecure.com/blog/2013/10/02/chained-vulnerabilities-firefox-android-pimp-browser/</a></li>
<li><a href="http://shellsherpa.nl/stealing-keepasswords-with-vivisect" time_added="1430713204" tags="vdb">Stealing KeePass(words) with Vivisect</a></li>
<li><a href="http://www.exploit-db.com/papers/24085/" time_added="1430558731" tags="exploit,stack">http://www.exploit-db.com/papers/24085/</a></li>
<li><a href="https://ctf-team.vulnhub.com/picoctf-2014-fancy-cache/" time_added="1430281038" tags="">https://ctf-team.vulnhub.com/picoctf-2014-fancy-cache/</a></li>
<li><a href="https://ctf-team.vulnhub.com/picoctf-2014-hardcore-rop/" time_added="1430279794" tags="">https://ctf-team.vulnhub.com/picoctf-2014-hardcore-rop/</a></li>
<li><a href="http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/" time_added="1430278675" tags="">http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modern-heap-overflow/</a></li>
<li><a href="http://blog.apiad.net/procedural-terrain-generation-in-unity-3d-part-iii/" time_added="1430278667" tags="">http://blog.apiad.net/procedural-terrain-generation-in-unity-3d-part-iii/</a></li>
<li><a href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/" time_added="1430278661" tags="">https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/</a></li>
<li><a href="https://eindbazen.net/2014/04/plaidctf-2014-tenement-100/" time_added="1430278657" tags="">https://eindbazen.net/2014/04/plaidctf-2014-tenement-100/</a></li>
<li><a href="http://quill18.com/unity_tutorials/" time_added="1430278643" tags="">Quill18&#039;s Unity 3d &amp; Blender Programming Tutorials</a></li>
<li><a href="http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php" time_added="1430198800" tags="">http://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php</a></li>
<li><a href="http://poppopret.org/2013/11/20/csaw-ctf-2013-kernel-exploitation-challenge/" time_added="1429813831" tags="">http://poppopret.org/2013/11/20/csaw-ctf-2013-kernel-exploitation-challenge/</a></li>
<li><a href="http://shell-storm.org/blog/Concolic-execution-taint-analysis-with-valgrind-and-constraints-path-solver-with-z3/" time_added="1429290817" tags="">http://shell-storm.org/blog/Concolic-execution-taint-analysis-with-valgrind-and-constraints-path-solver-with-z3/</a></li>
<li><a href="https://www.mandiant.com/blog/custom-vdb-debugger-exploit-analysis/" time_added="1429250076" tags="">https://www.mandiant.com/blog/custom-vdb-debugger-exploit-analysis/</a></li>
<li><a href="http://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/" time_added="1428405884" tags="">Close Encounters with Symbolic Execution (Part 2) – ...And You Will Know Us</a></li>
<li><a href="http://broot.ca/csaw2013-crypto-100" time_added="1428365199" tags="">http://broot.ca/csaw2013-crypto-100</a></li>
<li><a href="http://ropshell.com/peda/Linux_Interactive_Exploit_Development_with_GDB_and_PEDA_Slides.pdf" time_added="1428141329" tags="">‎ropshell.com/peda/Linux_Interactive_Exploit_Development_with_GDB_and_PEDA_</a></li>
<li><a href="https://github.com/gaffe23/gaffe-ota2/tree/master/egregiously-catastrophic-bifurcation" time_added="1428141281" tags="">gaffe-ota2/egregiously-catastrophic-bifurcation at master · gaffe23/gaffe-o</a></li>
<li><a href="http://www.thegeekstuff.com/2012/04/create-threads-in-linux/" time_added="1428141024" tags="">http://www.thegeekstuff.com/2012/04/create-threads-in-linux/</a></li>
<li><a href="http://pbiernat.blogspot.com/2014/09/bypassing-python-sandbox-by-abusing.html" time_added="1428140632" tags="">http://pbiernat.blogspot.com/2014/09/bypassing-python-sandbox-by-abusing.html</a></li>
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1165" time_added="1427869514" tags="">Codegate 2014: membership (800pt pwnable) write-up | :: Plaid Parliament of</a></li>
<li><a href="http://blog.ioactive.com/2014/11/elf-parsing-bugs-by-example-with-melkor.html" time_added="1427612768" tags="">IOActive Labs Research: ELF Parsing Bugs by Example with Melkor Fuzzer</a></li>
<li><a href="http://phrack.org/issues/67/13.html" time_added="1427601673" tags="">http://phrack.org/issues/67/13.html</a></li>
<li><a href="http://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb.html" time_added="1427589841" tags="">http://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb.html</a></li>
<li><a href="http://www.codeproject.com/Articles/4210/C-Reverse-Disassembly" time_added="1427589783" tags="">http://www.codeproject.com/Articles/4210/C-Reverse-Disassembly</a></li>
<li><a href="http://dfir.org/?q=node/8" time_added="1427589779" tags="">http://dfir.org/?q=node/8</a></li>
<li><a href="https://www.youtube.com/watch?v=j5NciKpHZzs" time_added="1427589764" tags="re">Reverse engineering vendor firmware drivers for little fun and no profit [l</a></li>
<li><a href="http://www.slideshare.net/reed2001/culture-1798664" time_added="1427589756" tags="">Culture</a></li>
<li><a href="http://www.0xebfe.net/blog/2015/01/24/ghost-in-the-shellcode-2015-pirates-treasure-500-write-up/" time_added="1427029651" tags="">Ghost in the Shellcode 2015: Pirate’s Treasure 500 write-up - 0xEBFE</a></li>
<li><a href="http://loccs.sjtu.edu.cn/~evermars/blog/2015/03/17/dodocrackme2_writeup/" time_added="1426875203" tags="">Codegate CTF 2015 Dodocrackme2 Write Up - EverMars</a></li>
<li><a href="https://medium.com/@shanewilton/ghost-in-the-shellcode-2015-blockys-revenge-7074a119115e" time_added="1426875194" tags="">Ghost in the Shellcode 2015 — Blocky’s Revenge — Medium</a></li>
<li><a href="http://homakov.blogspot.com/2014/02/how-i-hacked-github-again.html?m=1" time_added="1426568956" tags="">http://homakov.blogspot.com/2014/02/how-i-hacked-github-again.html?m=1</a></li>
<li><a href="http://firstround.com/article/From-0-to-1B-Slacks-Founder-Shares-Their-Epic-Launch-Strategy" time_added="1426568951" tags="">http://firstround.com/article/From-0-to-1B-Slacks-Founder-Shares-Their-Epic-Launch-Strategy</a></li>
<li><a href="http://www.html5rocks.com/en/tutorials/casestudies/racer/" time_added="1426568934" tags="">Case Study: Building Racer - HTML5 Rocks</a></li>
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1146" time_added="1426568927" tags="">GiTS 2014: fuzzy | :: Plaid Parliament of Pwning ::</a></li>
<li><a href="http://ppp.cylab.cmu.edu/wordpress/?p=1152" time_added="1426568922" tags="">GiTS 2014: gitsmsg | :: Plaid Parliament of Pwning ::</a></li>
<li><a href="http://stackoverflow.com/questions/13159564/explain-this-implementation-of-malloc-from-the-kr-book" time_added="1426568912" tags="">c - Explain this implementation of malloc from the K&amp;R book - Stack Overflo</a></li>
<li><a href="http://danluu.com/malloc-tutorial/" time_added="1426568907" tags="">http://danluu.com/malloc-tutorial/</a></li>
<li><a href="http://youtu.be/j2HSd3HCpDs" time_added="1426568903" tags="">http://youtu.be/j2HSd3HCpDs</a></li>
<li><a href="http://www.ccs.neu.edu/home/jnl22/oldsite/cshonor/jeff.html" time_added="1426568900" tags="">http://www.ccs.neu.edu/home/jnl22/oldsite/cshonor/jeff.html</a></li>
<li><a href="https://blog.skullsecurity.org/2014/plaidctf-writeup-for-pwn-275-kappa-type-confusion-vuln" time_added="1426568890" tags="">https://blog.skullsecurity.org/2014/plaidctf-writeup-for-pwn-275-kappa-type-confusion-vuln</a></li>
<li><a href="http://resources.infosecinstitute.com/padding-oracle-attack-2/" time_added="1426568883" tags="">http://resources.infosecinstitute.com/padding-oracle-attack-2/</a></li>
<li><a href="https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100" time_added="1426568875" tags="">https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100</a></li>
<li><a href="http://defcon.org/html/links/dc-archives/dc-18-archive.html" time_added="1426568870" tags="">DEF CON® Hacking Conference - DEF CON 18 Archive</a></li>
<li><a href="https://www.youtube.com/watch?v=fEmO7wQKCMw" time_added="1426568866" tags="defcon">DEFCON 18: How I Met Your Girlfriend 1/3 - YouTube</a></li>
<li><a href="http://blog.exodusintel.com/2013/01/07/who-was-phone/" time_added="1426050341" tags="">http://blog.exodusintel.com/2013/01/07/who-was-phone/</a></li>
<li><a href="http://broot.ca/gitsctf-pillowtalk-crypto-200" time_added="1426002653" tags="">http://broot.ca/gitsctf-pillowtalk-crypto-200</a></li>
<li><a href="https://maijin.github.io/radare2book/introduction/getting_radare.html" time_added="1425880025" tags="">https://maijin.github.io/radare2book/introduction/getting_radare.html</a></li>
<li><a href="http://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/" time_added="1425880010" tags="">http://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execu</a></li>
<li><a href="http://en.m.wikipedia.org/wiki/Symbolic_execution" time_added="1425879423" tags="">http://en.m.wikipedia.org/wiki/Symbolic_execution</a></li>
<li><a href="https://vagosec.org/2013/09/wordpress-php-object-injection/" time_added="1425879400" tags="">https://vagosec.org/2013/09/wordpress-php-object-injection/</a></li>
<li><a href="http://resources.infosecinstitute.com/xml-vulnerabilities/" time_added="1425879387" tags="">XML vulnerabilities - InfoSec Institute</a></li>
<li><a href="https://www.blackhat.com/presentations/bh-usa-07/Amini_and_Portnoy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf" time_added="1425879382" tags="">https://www.blackhat.com/presentations/bh-usa-07/Amini_and_Portnoy/Whitepap</a></li>
<li><a href="http://blog.astrumfutura.com/2012/03/a-hitchhikers-guide-to-cross-site-scripting-xss-in-php-part-1-how-not-to-use-htmlspecialchars-for-output-escaping/" time_added="1425879363" tags="">A Hitchhiker’s Guide to Cross-Site Scripting (XSS) in PHP (Part 1): How Not</a></li>
<li><a href="http://crypto.stanford.edu/~blynn/rop/" time_added="1425848358" tags="">64-bit Linux Return-Oriented Programming</a></li>
<li><a href="https://github.com/thmsmlr/ctf-writeups/tree/master/2014-seccon/binary-karuta" time_added="1425393812" tags="">ctf-writeups/2014-seccon/binary-karuta at master · thmsmlr/ctf-writeups</a></li>
<li><a href="http://blog.cryptographyengineering.com/?m=1" time_added="1425393692" tags="cryptography">http://blog.cryptographyengineering.com/?m=1</a></li>
<li><a href="http://kitctf.de/writeups/gits2015/aart/" time_added="1424884867" tags="">GITS 2015 CTF &#039;aart&#039; writeup</a></li>
<li><a href="http://www.cryptofails.com/" time_added="1424884519" tags="cryptography">http://www.cryptofails.com/</a></li>
<li><a href="https://www.arneswinnen.net/2013/11/hack-lu-2013-ctf-wannabe-writeup-part-one-web-exploitation/" time_added="1424884170" tags="">https://www.arneswinnen.net/2013/11/hack-lu-2013-ctf-wannabe-writeup-part-one-web-exploitation/</a></li>
<li><a href="http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet" time_added="1424884161" tags="">Reverse Shell Cheat Sheet | pentestmonkey</a></li>
<li><a href="https://msdn.microsoft.com/en-us/library/ms220938(v=vs.90).aspx" time_added="1424026692" tags="">The Structure of a Page Heap Block</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/27/9" time_added="1423635684" tags="">http://www.openwall.com/lists/oss-security/2015/01/27/9</a></li>
<li><a href="http://www.vice.com/read/nasa-patient-8179-200?utm_source=vicefbus" time_added="1423635088" tags="">How I Felt After 70 Days of Lying in Bed for Science | VICE | United States</a></li>
<li><a href="https://www.youtube.com/watch?v=5pOxlazS3zs" time_added="1421800597" tags="linux">&quot;Linux Sucks&quot; - 2014 - YouTube</a></li>
<li><a href="http://en.m.wikipedia.org/wiki/Birthday_attack" time_added="1421800536" tags="">http://en.m.wikipedia.org/wiki/Birthday_attack</a></li>
<li><a href="http://v0ids3curity.blogspot.com/2013/12/30c3-ctf-sandbox-300-int80-team-segfault.html?m=1" time_added="1421800514" tags="">http://v0ids3curity.blogspot.com/2013/12/30c3-ctf-sandbox-300-int80-team-segfault.html?m=1</a></li>
<li><a href="http://forensics.spreitzenbarth.de/" time_added="1421788197" tags="">forensic blog</a></li>
<li><a href="https://mobileforensics.wordpress.com/category/android-forensics/" time_added="1421788184" tags="">Android Forensics | Mobile Device Forensics</a></li>
<li><a href="http://lockboxx.blogspot.com/2014/01/ghost-in-shellcode-2014-ctf-writeup.html" time_added="1421787459" tags="">LockBoxx: Ghost in the ShellCode 2014 CTF WriteUp: Choose Your Pwn Adventur</a></li>
<li><a href="http://www.marvelousbreadchris.me/?p=17" time_added="1420858979" tags="">http://www.marvelousbreadchris.me/?p=17</a></li>
<li><a href="http://mattmahoney.net/dc/dce.html" time_added="1420815179" tags="compression">Data Compression Explained</a></li>
<li><a href="http://parsingintro.sourceforge.net/" time_added="1420815173" tags="compilers">How parsers and compilers work</a></li>
<li><a href="http://gnoobz.com/ebctf-2013-bin-300-crack-the-password.html" time_added="1420815166" tags="">http://gnoobz.com/ebctf-2013-bin-300-crack-the-password.html</a></li>
<li><a href="http://captf.com/practice-ctf/" time_added="1420742410" tags="">http://captf.com/practice-ctf/</a></li>
<li><a href="https://blog.skullsecurity.org/2013/epic-cnot-writeup-plaidctf" time_added="1420742324" tags="">https://blog.skullsecurity.org/2013/epic-cnot-writeup-plaidctf</a></li>
<li><a href="http://cs.lmu.edu/~ray/notes/introcompilers/" time_added="1420739932" tags="compilers">Introduction to Compilers</a></li>
<li><a href="https://blog.skullsecurity.org/2014/defcon-quals-writeup-for-byhd-reversing-a-huffman-tree" time_added="1420736706" tags="">https://blog.skullsecurity.org/2014/defcon-quals-writeup-for-byhd-reversing-a-huffman-tree</a></li>
<li><a href="https://www.schneier.com/" time_added="1420736051" tags="">https://www.schneier.com/</a></li>
<li><a href="http://developer.android.com/guide/topics/connectivity/nfc/nfc.html" time_added="1420736035" tags="">http://developer.android.com/guide/topics/connectivity/nfc/nfc.html</a></li>
<li><a href="https://github.com/bidord/pykek" time_added="1420736028" tags="">bidord/pykek</a></li>
<li><a href="http://www.apriorit.com/dev-blog/255-android-rooting" time_added="1420735948" tags="">Android Rooting for Programmers</a></li>
<li><a href="http://developer.android.com/guide/topics/connectivity/nfc/advanced-nfc.html#top" time_added="1420735132" tags="">http://developer.android.com/guide/topics/connectivity/nfc/advanced-nfc.html#top</a></li>
<li><a href="http://stackoverflow.com/questions/5741187/sql-injection-that-gets-around-mysql-real-escape-string" time_added="1420735117" tags="sql injection">php - SQL injection that gets around mysql_real_escape_string() - Stack Ove</a></li>
<li><a href="http://gnoobz.com/defcon-ctf-quals-2013-xffxe4xcc-300-linked.html" time_added="1420734654" tags="">http://gnoobz.com/defcon-ctf-quals-2013-xffxe4xcc-300-linked.html</a></li>
<li><a href="https://forum.exploitee.rs/google-chromecast-f48/topic1604.html" time_added="1420734445" tags="">https://forum.exploitee.rs/google-chromecast-f48/topic1604.html</a></li>
<li><a href="http://shell-storm.org/blog/Linux-process-execution-and-the-useless-ELF-header-fields/" time_added="1420734441" tags="elf,format,fuzzing">http://shell-storm.org/blog/Linux-process-execution-and-the-useless-ELF-header-fields/</a></li>
<li><a href="http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-invisible-150-write-up/#more-1092" time_added="1419968527" tags="compilers">http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-invisible-150-write-up/#more-1092</a></li>
<li><a href="http://moyix.blogspot.com/2013/09/announcing-panda-platform-for.html" time_added="1419968496" tags="">http://moyix.blogspot.com/2013/09/announcing-panda-platform-for.html</a></li>
<li><a href="http://moyix.blogspot.com/2014/07/breaking-spotify-drm-with-panda.html" time_added="1419968488" tags="crypto,project">http://moyix.blogspot.com/2014/07/breaking-spotify-drm-with-panda.html</a></li>
<li><a href="http://www.newyorker.com/culture/richard-brody/the-life-lessons-of-spring-breakers" time_added="1419014990" tags="">http://www.newyorker.com/culture/richard-brody/the-life-lessons-of-spring-breakers</a></li>
<li><a href="http://wiremask.eu/category/tutorials/" time_added="1418862783" tags="">http://wiremask.eu/category/tutorials/</a></li>
<li><a href="http://fastcompression.blogspot.com/2011/05/lz4-explained.html" time_added="1418150042" tags="">RealTime Data Compression: LZ4 explained</a></li>
<li><a href="https://fixme.ch/wiki/CTF" time_added="1418074970" tags="">https://fixme.ch/wiki/CTF</a></li>
<li><a href="http://stackoverflow.com/questions/15978204/what-are-javascripts-builtin-strings" time_added="1417997813" tags="fun,javascript">obfuscation - What are JavaScript&#039;s builtin strings? - Stack Overflow</a></li>
<li><a href="http://blog.opensecurityresearch.com/2014/07/writing-slack-space-on-windows.html?m=1" time_added="1417895469" tags="">http://blog.opensecurityresearch.com/2014/07/writing-slack-space-on-windows.html?m=1</a></li>
<li><a href="http://tasteless.se/2014/08/hitcon-ctf-2014-callme-exploiting-350/" time_added="1417895457" tags="">http://tasteless.se/2014/08/hitcon-ctf-2014-callme-exploiting-350/</a></li>
<li><a href="http://jsfiddle.net/w9rFF/14/" time_added="1417895445" tags="fun,javascript">Edit fiddle - JSFiddle</a></li>
<li><a href="http://counterhack.net/Counter_Hack/Articles.html" time_added="1417558469" tags="">http://counterhack.net/Counter_Hack/Articles.html</a></li>
<li><a href="http://blog.commandlinekungfu.com/2010/01/episode-77-usb-history.html?m=1" time_added="1417234707" tags="">http://blog.commandlinekungfu.com/2010/01/episode-77-usb-history.html?m=1</a></li>
</ul>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment