Reversing at Scale: AI-Powered Malware Detection for Apple’s Binaries
blog.virustotal.com·1d·
🔓Hacking
Flag this post
Low-Level Hacks
blog.raycursive.com·4d·
Discuss: Hacker News
🔓Hacking
Flag this post
v3.42.0
gitlab.exherbo.org·2d
🐧Linux
Flag this post
Hyprland 0.52.0
hypr.land·9h·
🔧Reverse Engineering
Flag this post
Once upon a time this blog was powered by make
refp.se·19h·
Discuss: Hacker News
🔧Reverse Engineering
Flag this post
Bootc for Workstation Use
lwn.net·1h·
🐧Linux
Flag this post
Linking and shrinking Rust static libraries: a tale of fire
centricular.com·16h·
🔧Reverse Engineering
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·2d·
🔧Reverse Engineering
Flag this post
How I Fell Down the Rabbit Hole of Dots and Dashes
dev.to·3h·
Discuss: DEV
🔧Reverse Engineering
Flag this post
You can use anti-trojan-source to defend (or detect) against the Glassworm Invisible Chars malware
snyk.io·3d·
Discuss: r/node
🔓Hacking
Flag this post
Working on a digital vault, looking for advice or examples (zero-knowledge, cryptography, encryption)
reddit.com·15h·
Discuss: r/rust
🔓Hacking
Flag this post
How I Found the Worst ASP.NET Vulnerability — A $10K Bug (CVE-2025-55315)
praetorian.com·11h
🔓Hacking
Flag this post
Void-Vault: A deterministic generative solution to password management
github.com·1d·
Discuss: r/archlinux
🔓Hacking
Flag this post
What is BSD? Come to a conference to find out!
bsdly.blogspot.com·11h·
🏗️Software Architecture
Flag this post
How to handle secrets on the command line
smallstep.com·5h·
Discuss: Hacker News
🔓Hacking
Flag this post
GPTF-8: A tokenizer-based character encoding
lesswrong.com·18h
🔧Reverse Engineering
Flag this post
pdxscript: VCS edition
blog.birbpara.de·2h
🔧Reverse Engineering
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·13h
🔓Hacking
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.com·1d
🔓Hacking
Flag this post