| | MinHash vs. Bitwise Set Hashing: Jaccard Similarity Showdown (endgame.com) |
| 1 point by bra-ket on Nov 15, 2019 | past |
|
| | NLP for Security: Malicious Language Processing (endgame.com) |
| 1 point by godelmachine on Sept 25, 2019 | past |
|
| | Elastic Announces Intent to Acquire Endgame (endgame.com) |
| 5 points by kyrrewk on June 5, 2019 | past |
|
| | Postmortem: Beating the NATS race (endgame.com) |
| 1 point by megatrontony on Dec 19, 2018 | past |
|
| | DNS Tunneling – Plight at the end of the tunnel (endgame.com) |
| 1 point by zzflop on Aug 16, 2018 | past |
|
| | An Introduction to Windows Kernel Debugging (endgame.com) |
| 1 point by dsr12 on April 12, 2018 | past |
|
| | Detecting Spectre and Meltdown Using Hardware Performance Counters (endgame.com) |
| 105 points by DyslexicAtheist on Jan 11, 2018 | past | 16 comments |
|
| | Detecting Spectre and Meltdown Using Hardware Performance Counters (endgame.com) |
| 2 points by Cwwm on Jan 10, 2018 | past |
|
| | Another 0 Day: Protection from a Use-After-Free Vulnerability (2016) (endgame.com) |
| 1 point by tosh on Jan 2, 2018 | past |
|
| | Endgame Needs a Sr. Front-End Developer (React and Redux Preferred) (endgame.com) |
| 1 point by Endgame_hired on Sept 1, 2017 | past |
|
| | Ten Process Injection Techniques: A Technical Survey (endgame.com) |
| 1 point by rbanffy on July 18, 2017 | past |
|
| | The Chakra Exploit and the Limitations of Modern Mitigation Techniques (endgame.com) |
| 1 point by DiabloD3 on March 1, 2017 | past |
|
| | The Chakra Exploit and the Limitations of Modern Mitigation Techniques (endgame.com) |
| 2 points by remx on Feb 28, 2017 | past |
|
| | Another 0day (Firefox/Tor), Another Prevention (before execution) (endgame.com) |
| 1 point by zhenjl on Dec 1, 2016 | past |
|
| | ROP Is Dying and Your Exploit Mitigations Are on Life Support (endgame.com) |
| 2 points by nutate on July 15, 2016 | past |
|
| | Mitigating Stagefright Attacks with the ARM Performance Monitoring Unit (endgame.com) |
| 24 points by DiabloD3 on June 22, 2016 | past | 6 comments |
|
| | Your Package Has Been [] Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain (endgame.com) |
| 2 points by moviuro on April 21, 2016 | past |
|
| | DEFCON Capture the Flag Qualification Challenge (endgame.com) |
| 1 point by sdas7 on Jan 18, 2016 | past |
|
| | Adobe Flash Vulnerability CVE-2015-7663 and Mitigating Exploits (endgame.com) |
| 38 points by DiabloD3 on Nov 11, 2015 | past | 7 comments |
|
| | Examining Malware with Python (endgame.com) |
| 9 points by armabiz on July 23, 2015 | past |
|
| | Could a Hollywood Breach Be the Tipping Point for New Cyber Legislation? (endgame.com) |
| 2 points by Kinetc on Jan 17, 2015 | past |
|
| | DEFCON Capture the Flag Qualification Challenge #2 (endgame.com) |
| 12 points by borski on June 5, 2014 | past | 1 comment |
|
| | DEFCON Capture the Flag Qualification Challenge #1 (endgame.com) |
| 109 points by drjohnson on May 25, 2014 | past | 16 comments |
|
| | DEFCON CTF Qualification Challenge #1 (endgame.com) |
| 2 points by whalesalad on May 22, 2014 | past |
|
| | Microsoft Win32k NULL Page Vulnerability Technical Analysis (endgame.com) |
| 2 points by lelf on Oct 15, 2013 | past |
|