HTB: Dump
0xdf.gitlab.io·3d
🔧Reverse Engineering
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·5h
🔧Reverse Engineering
Flag this post
A File Format Uncracked for 20 Years
🔧Reverse Engineering
Flag this post
I Built a File-Hiding App Because I Didn't Know Any Better (And It Actually Works!)
🔧Reverse Engineering
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.edu·1d
🔧Reverse Engineering
Flag this post
A Deep Dive into the Morris Worm
🔧Reverse Engineering
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.net·1d
🔧Reverse Engineering
Flag this post
Anticheat: a non-technical look without psychoanalysis
lesswrong.com·14h
🔧Reverse Engineering
Flag this post
Question about WIFI and routers.
🔧Reverse Engineering
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.com·1d
🔧Reverse Engineering
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
🔧Reverse Engineering
Flag this post
Participants ready to make use of Financial literacy training
searchlight.vc·3h
💻Programming
Flag this post
𝐭𝐰𝐨𝐟𝐞𝐫.𝗀𝖺𝗆𝖾𝗌 𝟏𝟏-𝟎𝟔-𝟐𝟓
iwebthings.joejenett.com·18h
💻Computer Science
Flag this post
Moves Are Broken
🔧Reverse Engineering
Flag this post
Jamf Threat Labs uncovers mobile app game leaking player credentials
jamf.com·1d
🔧Reverse Engineering
Flag this post
Share Your Projects: Imperfectionism
hackaday.com·16h
🏗️Software Architecture
Flag this post
Loading...Loading more...