Co-Pain

Co-Pain

244 bookmarks
Custom sorting
cncf/k8s-conformance
cncf/k8s-conformance
🧪CNCF K8s Conformance Working Group. Contribute to cncf/k8s-conformance development by creating an account on GitHub.
·github.com·
cncf/k8s-conformance
diotro/maestro
diotro/maestro
Contribute to diotro/maestro development by creating an account on GitHub.
·github.com·
diotro/maestro
flipcoder/3mux
flipcoder/3mux
Terminal multiplexer inspired by i3. Contribute to flipcoder/3mux development by creating an account on GitHub.
·github.com·
flipcoder/3mux
gravitational/gravity
gravitational/gravity
Kubernetes application deployments for restricted, regulated or remote environments. - gravitational/gravity
·github.com·
gravitational/gravity
LinusHenze/WebKit-RegEx-Exploit
LinusHenze/WebKit-RegEx-Exploit
Contribute to LinusHenze/WebKit-RegEx-Exploit development by creating an account on GitHub.
·github.com·
LinusHenze/WebKit-RegEx-Exploit
Matael/dotfiles
Matael/dotfiles
matael's dotfiles. Contribute to Matael/dotfiles development by creating an account on GitHub.
·github.com·
Matael/dotfiles
opensource-apple/cctools
opensource-apple/cctools
Contribute to opensource-apple/cctools development by creating an account on GitHub.
·github.com·
opensource-apple/cctools
Did the “Man With No Name” Feel Insecure?
Did the “Man With No Name” Feel Insecure?
Posted by James Forshaw, Taker of Names Sometimes when I'm doing security research I'll come across a bug which surprises me. I discove...
·googleprojectzero.blogspot.com·
Did the “Man With No Name” Feel Insecure?
More Mac OS X and iPhone sandbox escapes and kernel bugs
More Mac OS X and iPhone sandbox escapes and kernel bugs
Posted by Ian Beer A couple of weeks ago Apple released OS X 10.9.5 and iOS 8 which fixed a number of sandbox escapes and privilege es...
·googleprojectzero.blogspot.com·
More Mac OS X and iPhone sandbox escapes and kernel bugs
Finding and exploiting ntpd vulnerabilities
Finding and exploiting ntpd vulnerabilities
Posted by Stephen Röttger, Time Lord [Foreword by Chris Evans: this post by Stephen represents the first Project Zero guest blog post. ...
·googleprojectzero.blogspot.com·
Finding and exploiting ntpd vulnerabilities
Exploiting the DRAM rowhammer bug to gain kernel privileges
Exploiting the DRAM rowhammer bug to gain kernel privileges
Rowhammer blog post (draft) Posted by Mark Seaborn, sandbox builder and breaker, with contributions by Thomas Dullien, reverse en...
·googleprojectzero.blogspot.com·
Exploiting the DRAM rowhammer bug to gain kernel privileges
A Tale of Two Exploits
A Tale of Two Exploits
Posted by Natalie Silvanovich, Collision Investigator and (Object) Field Examiner CVE-2015-0336 is a type confusion vulnerability in the AS...
·googleprojectzero.blogspot.com·
A Tale of Two Exploits
In-Console-Able
In-Console-Able
Posted by James Forshaw, giving the security community a shoulder to cry on. TL;DR; this blog post describes an unfixed bug in Windows...
·googleprojectzero.blogspot.com·
In-Console-Able
Dude, where’s my heap?
Dude, where’s my heap?
Guest posted by Ivan Fratric, spraying 1TB of memory The ability to place controlled content to a predictable location in memory can be ...
·googleprojectzero.blogspot.com·
Dude, where’s my heap?
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Posted by Natalie Silvanovich, Planner of Bug Bashes Recently, Project Zero researched a popular Android phone, the Samsung Galaxy S6 E...
·googleprojectzero.blogspot.com·
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Down the Rabbit-Hole...
Down the Rabbit-Hole...
Posted by Tavis Ormandy, Security Research Over-Engineer. “Sometimes, hacking is just someone spending more time on something than anyo...
·googleprojectzero.blogspot.com·
Down the Rabbit-Hole...
Implant Teardown
Implant Teardown
Posted by Ian Beer, Project Zero In the earlier posts we examined how the attackers gained unsandboxed code execution as root on iPhone...
·googleprojectzero.blogspot.com·
Implant Teardown
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
Posted by Ned Williamson, 20% on Project Zero Introduction I have a somewhat unique opportunity in this writeup to highlight my experie...
·googleprojectzero.blogspot.com·
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
Hosting your own runners - GitHub Docs
Hosting your own runners - GitHub Docs
You can create self-hosted runners to run workflows in a highly customizable environment.
·docs.github.com·
Hosting your own runners - GitHub Docs
Towards ground truthing observations in gray-box anomaly detection
Towards ground truthing observations in gray-box anomaly detection
Anomaly detection has been attracting interests from researchers due to its advantage of being able to detect zero-day exploits. A gray-box anomaly detector first observes benign executions of a computer program and then extracts reliable rules that govern the normal execution of the program. However, such observations from benign executions are not necessarily true evidences supporting the rules learned. For example, the observation that a file descriptor being equal to a socket descriptor should not be considered supporting a rule governing the two values to be the same. Ground truthing s...
·ieeexplore.ieee.org·
Towards ground truthing observations in gray-box anomaly detection
Computing Three-Dimensional Constrained Delaunay Refinement Using the GPU
Computing Three-Dimensional Constrained Delaunay Refinement Using the GPU
We propose the first GPU algorithm for the 3D constrained Delaunay refinement problem. For an input of a piecewise linear complex G and a constant B, it produces, by adding Steiner points, a constrained Delaunay triangulation conforming to G and containing tetrahedra mostly with radiusedge ratios smaller than B. Our implementation of the algorithm shows that it can be an order of magnitude faster than the best CPU software while using similar quantities of Steiner points to produce triangulations of comparable qualities. It thus reduces the computing time of triangulation refinement from po...
·ieeexplore.ieee.org·
Computing Three-Dimensional Constrained Delaunay Refinement Using the GPU
Beyond the collaterals: Additional value of multiphase CTA in acute ischemic stroke evaluation - D Volders, JR Shewchuk, M Marangoni, E Ni Mhurchu, MKS Heran, 2019
Beyond the collaterals: Additional value of multiphase CTA in acute ischemic stroke evaluation - D Volders, JR Shewchuk, M Marangoni, E Ni Mhurchu, MKS Heran, 2019
Purpose Multiphase computed tomography angiography (MP-CTA) is an innovative imaging tool that can give those managing acute ischemic stroke temporal informatio...
·journals.sagepub.com·
Beyond the collaterals: Additional value of multiphase CTA in acute ischemic stroke evaluation - D Volders, JR Shewchuk, M Marangoni, E Ni Mhurchu, MKS Heran, 2019
Ordinal Scoring of Coronary Artery Calcifications
Ordinal Scoring of Coronary Artery Calcifications
Ordinal Scoring of Coronary Artery Calcifications on Low-Dose CT Scans of the Chest Is Predictive of Death From Cardiovascular Disease. RSNA
·lucatraining.org·
Ordinal Scoring of Coronary Artery Calcifications