Now that it is *almost* 2024, what are some of the most secure malloc implementations we have available?

I am looking at some of the high security malloc implementations and omalloc and smalloc both look promising as an alternative to Google’s Malloc. But, instead of just taking my own opinion – what is the view of the community when it come… Continue reading Now that it is *almost* 2024, what are some of the most secure malloc implementations we have available?

What is the technical means by which the "Scammer Payback" YouTuber hack his victims? [closed]

The Payback Scammer is a youtube channel where he glorifies attacks against professional con artists. He routinely gains access to the personal directory of the scammer – reads contents of the scammer’s directory to incite fear, and delet… Continue reading What is the technical means by which the "Scammer Payback" YouTuber hack his victims? [closed]

What other methods would an attacker use for making an HTTP request that isn’t Fetch() or an XHR or using the DOM?

We are running user-submitted JavaScript, server-side to be executed within a headless browser that doesn’t have a DOM or any child of the window or document or location objects – because these are already removed. Is there a way for plain… Continue reading What other methods would an attacker use for making an HTTP request that isn’t Fetch() or an XHR or using the DOM?