Active
Recent
Comments
Search
Login
Login
serhack.me: 18 stories from 3 submitters
3
Analysis of a Redline Based Malware
reversing
security
serhack.me
authored by
serhack
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Reverse Engineering the OMNIVISION OS12D40 Driver
reversing
serhack.me
authored by
serhack
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Techniques for Setting up Peripherals via DMA and PIO
hardware
serhack.me
authored by
serhack
12 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Exploring the Operating System of Reolink RLC-801A
compsci
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
5
Understanding the UBI File System in Embedded Devices
compsci
hardware
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Dissecting Reolink RLC-810A Hardware: A Detailed View
hardware
reversing
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
11
Booting an Embedded OS: the Booting and U-Boot Phase
reversing
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
Introduction to Firmware Analysis of a Reolink IP Camera
reversing
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
The Story Behind the Alternative Genesis Block of Bitcoin
finance
merkle-trees
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Unveiling the Anonymous Author: Stylometry Techniques
privacy
serhack.me
authored by
serhack
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
23
Analyzing the Mario Themed Malware
reversing
serhack.me
authored by
serhack
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
How to Measure Execution Time of a Program
compsci
serhack.me
authored by
serhack
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
2
How to Measure Execution Time of a Program
testing
serhack.me
authored by
serhack
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
How to Write a Technical Book
book
serhack.me
authored by
serhack
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
37
Convos: A Persistent Self-Hosted Web Client for IRC
perl
serhack.me
authored by
serhack
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
4
A Practical Analysis of the Ledger Phishing Email
security
serhack.me
authored by
serhack
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Monitoring your own infrastructure using Grafana, InfluxDB, and CollectD
devops
serhack.me
via
inactive-user
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
MEGA Chrome Extension Hacked
security
serhack.me
via
river
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1