This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.comยท20h
๐งReverse Engineering
Flag this post
Help me understand why the print! is executing after taking the input.
๐งReverse Engineering
Flag this post
Base64 Decoder โ Unwrap Your Data Like a Secret Message ๐ต๏ธโโ๏ธ๐
๐งReverse Engineering
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nzยท3h
๐งReverse Engineering
Flag this post
How to handle secrets on the command line
๐งLinux
Flag this post
How to Choose a Dependency: Build vs Buy, Risk Management, and More
hackernoon.comยท20h
๐ปProgramming
Flag this post
Why Colts QB Daniel Jones isn't to blame for all 5 turnovers vs. Steelers: Watch video
nytimes.comยท18h
๐งReverse Engineering
Flag this post
Tracking Down Progressively-Enhanceable APIs
willhbr.netยท23h
๐งReverse Engineering
Flag this post
Fake CAPTCHA sites now have tutorial videos to help victims install malware
malwarebytes.comยท20h
๐งReverse Engineering
Flag this post
Anticheat: a non-technical look without psychoanalysis
lesswrong.comยท1d
๐งReverse Engineering
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.netยท2d
๐งReverse Engineering
Flag this post
HTB: Dump
0xdf.gitlab.ioยท4d
๐งReverse Engineering
Flag this post
Metaโs โRule of Twoโ Is Dangerous: The AI Security Crisis No Oneโs Admitting
pub.towardsai.netยท1d
๐งReverse Engineering
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.eduยท2d
๐งReverse Engineering
Flag this post
A Deep Dive into the Morris Worm
๐งReverse Engineering
Flag this post
pdxscript: VCS edition
blog.birbpara.deยท10h
๐งReverse Engineering
Flag this post
Loading...Loading more...