mahaloz.re Open in urlscan Pro
2606:4700:3034::6815:2aa  Public Scan

Submitted URL: http://mahaloz.re/
Effective URL: https://mahaloz.re/
Submission: On July 18 via api from US — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

 * /mahaloz.re
 * /about
 * /tags
 * /feed


ALOHA MAI KĀKOU

All things hacking from me, mahaloz. If you’re looking for a specific category
of posts, like research, take a look at the /tags page; otherwise, you can find
all posts here. You can also find an Atom (RSS-like) feed at /feed.


 * [ 2024-01-10 ] 30 Years of Decompilation and the Unsolved Structuring
   Problem: Part 2
 * [ 2024-01-02 ] 30 Years of Decompilation and the Unsolved Structuring
   Problem: Part 1
 * [ 2023-02-25 ] PwnAgent: A One-Click WAN-side RCE in Netgear RAX Routers with
   CVE-2023-24749
 * [ 2022-09-23 ] Tips and tricks for reversing foreign architecture games
 * [ 2022-02-07 ] Insomnihack22: Reversing a flawed ECC rng-as-a-service Go
   Server
 * [ 2021-10-03 ] Tasteless 21: Godot Game Hacking in Tasteless Shores
 * [ 2020-09-13 ] Exploiting a custom tetris game in CSAW Quals 2020
 * [ 2020-08-30 ] Reversing printf-as-a-VM service in Google Quals 2020
 * [ 2020-04-14 ] Lambda calculus challenges for ASU Undergrads
 * [ 2020-02-14 ] Reversing a game implemented in a rom-to-eng translator in
   HackTM 2020
 * [ 2020-02-13 ] Pwning the boot process: Uboot CVE-2019-13103 to
   CVE-2019-13106
 * [ 2019-10-21 ] I'll Crash your Netflix TV: finding CVE-2019-10028