Low-Level Hacks
🔓Hacking
Flag this post
Exploiting Data Structures for Bypassing and Crashing Anti-Malware Solutions via Telemetry Complexity Attacks
arxiv.org·21h
🏗️Software Architecture
Flag this post
Hyprland 0.52.0
🔧Reverse Engineering
Flag this post
Bootc for Workstation Use
🐧Linux
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🔧Reverse Engineering
Flag this post
How I Found the Worst ASP.NET Vulnerability — A $10K Bug (CVE-2025-55315)
praetorian.com·11h
🔓Hacking
Flag this post
How to handle secrets on the command line
🔓Hacking
Flag this post
GPTF-8: A tokenizer-based character encoding
lesswrong.com·18h
🔧Reverse Engineering
Flag this post
pdxscript: VCS edition
blog.birbpara.de·2h
🔧Reverse Engineering
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·13h
🔓Hacking
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.com·1d
🔓Hacking
Flag this post
Loading...Loading more...