lcamtuf.coredump.cx
Open in
urlscan Pro
2606:4700:3036::6815:53c0
Public Scan
Submitted URL: http://lcamtuf.coredump.cx/
Effective URL: https://lcamtuf.coredump.cx/
Submission: On June 11 via manual from US — Scanned from DE
Effective URL: https://lcamtuf.coredump.cx/
Submission: On June 11 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
LCAMTUF.COREDUMP.CX HOT OFF THE PRESSES * Weekly articles on Substack - electronics, CS, and more. Subscribe or browse a thematic catalog, * Sir Box-a-Lot and Bob the Cat: two spiffy, retro handheld games for the entire family, * Photography for geeks, a contrarian introduction to taking good pictures (also translated to German), * Practical Doomsday, a thought-provoking book on threat modeling for everyday calamities, * Weird mushrooms of the PNW, an exercise in backyard photography. INFOSEC PUBLICATIONS (PRE-2018) I'm a long-time contributor to the information security community and a recipient of the Lifetime Achievement Pwnie Award. In addition to identifying hundreds of security flaws in a good chunk of the software that powers the internet, some of my public infosec works include: * American Fuzzy Lop, a revolutionary guided fuzzer that greatly advanced the state-of-the-art in vulnerability research (2014-2017), * The Tangled Web, a seminal book shining light onto the security properties and pitfalls of the browser environment (2011), * P0f v3, a groundbreaking passive OS fingerprinter (2000, 2014), * Silence on the Wire, a book dealing with passive signal analysis and reconnaisance in computer security applications (2005). Beyond this, I authored dozens of other small tools, fuzzers, and so on; examples include Skipfish (2012), a novel high-performance web scanner that served as one of the key components of the Google Cloud Scanner; and Ratproxy (2009), a passive co-pilot proxy for performing web security assessments. On the research front, I'm fond of my early analysis of non-XSS HTML injection vulnerabilities (2011); some neat CSS algebra data exfil attacks (2014); a comprehensive review of web tracking vectors (2014); the pioneering 2001 / 2002 research on ISN vulnerabilities (part 2); a warning about IP fragmentation risks (2003); the analysis of signal handling flaws (2001); or the work on the dangers of tmpwatch-type utilities (2002). Some additional pre-2018 notes can be found on my now-retired blog. OTHER INTERESTS * Practical Doomsday, a guide to everyday risk management in the physical realm (2022), * The Hyperinflation Gallery, a visual exploration of the forgotten history of failed currencies (2020), * Dear Leaders, an equally unserious inquiry into the world of narcissistic despots around the globe (2021), * Comics About Communism, a collection of unusual artifacts from the Cold War (2021), * Photography for geeks, a contrarian introduction to the art of photography (2022), * A brief history of counting machines, a mini-exhibition on my Substack (2023), * Guerrilla Guide to CNC, an in-depth introduction to CAD, CAM, and resin casting (2013), * Concise Electronics for Geeks, a minimalist introduction to circuit-building (2010), * Assorted original writings on Substack and hobby videos on YouTube. This site is also the home to a variety of more whimsical or one-off projects, including evil plasma globes, Omnibot mkII, a 2.5D photography rig, the Ultimate Machine, a system for high-speed water drop photography, a PNW radiation monitor, a Geiger-Mueller lamp, a voltmeter clock, a dial-a-threat indicator, random notes on robotics, assorted woodworking projects, my old prepping guide (+ a supplement on radios), random photos, and more. This website was written by a human without the help of large language models. The content is not licensed for use in ML training or ML content generation. You can email me at lcamtuf@coredump.cx, add me on Mastodon or Twitter, or subscribe on Substack. Your lucky number is 23957825.