1Wick: Functional, reactive, WebAssembly on both client and server (opens in new tab)(github.com)2jsoverson2y ago0
5From Zero to Deepfake – How easy is it to create a deepfake? (opens in new tab)(medium.com)4jsoverson6y ago0
7Combolist.org – generate fake combolists to use as examples or for test input (opens in new tab)(combolist.org)1jsoverson6y ago0
9Reverse Engineering JavaScript by example – flatmap-stream payload A (opens in new tab)(blog.shapesecurity.com)3jsoverson7y ago0
11Exploiting dev infrastructure is insanely easy: Analysis of the npm exploit (opens in new tab)(medium.com)5jsoverson7y ago0
12Intercepting and Modifying Responses with Chrome and the Devtools Protocol (opens in new tab)(blog.shapesecurity.com)3jsoverson7y ago0
13Hackers account for 90% of login attempts at online retailers (opens in new tab)(qz.com)101jsoverson7y ago64
14Pokémon Go API – A Closer Look at Automated Attacks (opens in new tab)(engineering.shapesecurity.com)17jsoverson9y ago0
15LifeLock to Pay $100M to Settle Charges that it failed to protect customer data (opens in new tab)(news.yahoo.com)1jsoverson10y ago0