Articles by mmsc
171

Making Firefox's right-click not suck with about:config (joshua.hu)

2

Using Aisle to Find Vulnerabilities in Amazon's Crypto Stack: AWS-LC and S2n-TLS (aisle.com)

106

AISLE’s autonomous analyzer found all CVEs in the January OpenSSL release (aisle.com)

7

The end of the curl bug-bounty (haxx.se)

3

Investigating shared dictionaries and ChatGPT breakage in Firefox (joshua.hu)

1

Gixy-Next: Nginx Configuration Security and Hardening Scanner (gixy.io)

2

Iranian Censorship, Bypasses, Browser Extensions, and Proxies (joshua.hu)

2

The Weakest Link Fallacy (ru.nl)

2

Popular NPM linter packages hijacked via phishing to drop malware (bleepingcomputer.com)

2

Tail Call Optimization Implementation in JavaScript Engines (stackoverflow.com)

1

Simulating Time with Square-Root Space (arxiv.org)

4

CVE-2025-27363: out of bounds write in FreeType <= 2.13.0 (openwall.com)

41

Gixy: Nginx Configuration Static Analyzer (github.com/dvershinin)

1

Un-Autocorrector (lingojam.com)

413

Teen on Musk's DOGE team graduated from 'The Com' (krebsonsecurity.com)

4

Pyramid Schemes in Albania (wikipedia.org)

4

Getting Cheated in a Videogame Led Him to a World of Online Crime (wsj.com)

123

U.S. Army Soldier Arrested in AT&T, Verizon Extortions (krebsonsecurity.com)

1

The cost of a NAND chip off attack is 170.83€ (errno.fr)

3

Toynbee Tiles (wikipedia.org)

28

Upcoming Hardening in PHP (dustri.org)

5

Zendesk: Email user verification bug bounty report retrospective (zendesk.com)

342

1 bug, $50k in bounties, a Zendesk backdoor (gist.github.com)

1

Webcam support on a MacBook running FreeBSD using PCI passthrough (joshua.hu)

2

Simulation of the 1972 Atari game Pong at a circuit level (falstad.com)

1

FreeBSD on MacBook Pro Retina 2014 (joshua.hu)

1

Show HN: Awk Version Comparison Dashboard (megamansec.github.io)

1

Watch How a Hacker's Infrared Laser Can Spy on Your Laptop's Keystrokes (wired.com)

1

"One of the most original expositions": The Vienna Poster Exhibition in 1888 (austrianposters.at)

1

Shadow of the Sun (2021) (mattlakeman.org)

1

Australian SIA calls for federal regulation of cyber security sector (thenightly.com.au)

2

Ask HN: What was the story of the attempted addition of a backdoor in WebKit?

2

Fixing typos and breaching Microsoft's perimeter (johnstawinski.com)

3

Brendanwall.jpg (brendangregg.com)

3

Geon/Shebang-Abuse (github.com/geon)

2

Show HN: LDAP Watchdog: Realtime LDAP monitoring for detecting directory changes (github.com/megamansec)

3

Show HN: SSH-Snake: Automated SSH-Based Network Traversal (github.com/megamansec)

25

Intentionally buggy commits for fame and papers (2021) (lwn.net)

2

The End of Innocence: What Happened After Apple Fired Steve Jobs (wired.com)

2

Cosmo, the Hacker 'God' Who Fell to Earth (wired.com)

4

Ask HN: Is there ever a reason to expose an SQL Server to the internet?

9

Facebook Messenger now limits WebP file attachments

3

Are the BSDs dying? Some security researchers think so (2018) (csoonline.com)

2

Speeding up NMAP service scanning 16x (joshua.hu)

1

How I Hacked Hacker News (2009) (news.ycombinator.com)

2

Everything that uses configurations should report the values they are using (joshua.hu)

4

Harbian-audit: Hardened Debian GNU/Linux distro auditing (github.com/hardenedlinux)