| | JavaScript Cryptography Considered Harmful (2011 – still relevant) (matasano.com) |
|
1 point by ColinWright on May 22, 2017 | past | 1 comment
|
| | Enough with the Salts: Updates on Secure Password Schemes (matasano.com) |
|
339 points by saturdayplace on April 1, 2015 | past | 221 comments
|
| | Enough with the Salts: Updates on Secure Password Schemes (matasano.com) |
|
16 points by alcari on March 26, 2015 | past
|
| | New Vulnerability: Mercurial Command Injection (CVE-2014-9462) (matasano.com) |
|
35 points by wglb on March 18, 2015 | past | 4 comments
|
| | Phate: Investigations into Windows Phone 8 (matasano.com) |
|
12 points by jerematasno on Jan 19, 2015 | past
|
| | Typing the Letters A-E-S Into Your Code (2009) (matasano.com) |
|
168 points by zorked on Jan 9, 2015 | past | 63 comments
|
| | Ninja Threat Modeling (2009) (matasano.com) |
|
20 points by wglb on Jan 8, 2015 | past
|
| | Bypassing OpenSSL Certificate Pinning in iOS Apps (matasano.com) |
|
32 points by silenteh on Jan 7, 2015 | past | 13 comments
|
| | JavaScript Cryptography Considered Harmful (matasano.com) |
|
127 points by mazsa on June 17, 2014 | past | 140 comments
|
| | Anatomy of a Rails Vulnerability: From Directory Traversal to Shell [pdf] (matasano.com) |
|
46 points by wglb on May 29, 2014 | past
|
| | Announcing The Matasano/Square CTF (matasano.com) |
|
297 points by alepper on Jan 17, 2014 | past | 72 comments
|
| | Javascript Cryptography Considered Harmful (matasano.com) |
|
3 points by apgwoz on June 24, 2013 | past | 1 comment
|
| | The Matasano Crypto Challenges (matasano.com) |
|
87 points by greyman on April 21, 2013 | past | 34 comments
|
| | Javascript Cryptography Considered Harmful (matasano.com) |
|
95 points by LVB on Jan 27, 2013 | past | 103 comments
|
| | Multiple 0-days in DarkComet RAT (matasano.com) |
|
1 point by mytummyhertz on Oct 9, 2012 | past
|
| | Attacking Clientside JIT Compilers (matasano.com) |
|
4 points by wglb on Sept 20, 2011 | past
|
| | Javascript Cryptography Considered Harmful (matasano.com) |
|
207 points by adgar on Aug 28, 2011 | past | 174 comments
|
| | Black Hat 2011: "Attacking Client Side JIT Compilers" (matasano.com) |
|
5 points by nbpoole on Aug 8, 2011 | past
|
| | Getting Started with Flint (matasano.com) |
|
1 point by wglb on March 27, 2010 | past
|
| | On reversing/anti-reversing techniques and running security competitions (matasano.com) |
|
5 points by r11t on Jan 22, 2010 | past
|
| | How To Hide^H^H^Handle Security Vulnerabilities In Your Products (matasano.com) |
|
10 points by niyazpk on Jan 12, 2010 | past | 1 comment
|
| | What You Need To Know About Secure Password Schemes (matasano.com) |
|
46 points by mcantor on Jan 9, 2010 | past | 12 comments
|
| | If You're Typing The Letters A-E-S Into Your Code, You're Doing It Wrong (matasano.com) |
|
94 points by jeffreyg on Jan 4, 2010 | past | 46 comments
|
| | Protecting the laptop herd (matasano.com) |
|
2 points by yan on Dec 22, 2009 | past
|
| | "Like it or not, developing an attack plan for a penetration test requires ..." (matasano.com) |
|
1 point by stakent on Nov 19, 2009 | past
|
| | Ninja Threat Modeling (matasano.com) |
|
16 points by gthank on Oct 20, 2009 | past | 11 comments
|
| | A C++ Challenge - The Conclusion (matasano.com) |
|
21 points by gthank on Oct 16, 2009 | past | 2 comments
|
| | Diffie Hellman Parameter Validation Attacks Explained (matasano.com) |
|
13 points by tptacek on Oct 15, 2009 | past | 2 comments
|
| | A C++ Challenge (matasano.com) |
|
33 points by wheels on Oct 12, 2009 | past | 24 comments
|
| | Ruby For Pentesters - WIN32OLE (matasano.com) |
|
18 points by Shamiq on Oct 7, 2009 | past | 3 comments
|
|
|
More |