Hacker Newsnew | past | comments | ask | show | jobs | submitlogin




The names of the files alone suggests many of these are quite deliberate.


most of those are demonstrations of the vulnerability




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: