Moves Are Broken
youtube.com·1d·
🔧Reverse Engineering
Flag this post
Streams in C#
dev.to·1d·
Discuss: DEV
💎C# Development
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·7h
💎C# Development
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.com·2d·
Discuss: Hacker News
🔧Reverse Engineering
Flag this post
Infostealers are making this old security practice new again
nordot.app·6h
🏗️Software Architecture
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·9h
🐧Linux
Flag this post
Seeking Advice: Tamper-Proofing a Memory Chip for Secure Delivery to a Paired Device (Embedded Authentication)
reddit.com·44m·
Discuss: r/embedded
🔧Reverse Engineering
Flag this post
Hacking the Color BASIC PRINT command – part 7
subethasoftware.com·3d
💻Programming
Flag this post
Once upon a time this blog was powered by make
refp.se·16h·
Discuss: Hacker News
🔧Reverse Engineering
Flag this post
What are computers for, anyway?
forum.merveilles.town·1d
💻Computer Science
Flag this post
Help with snake clon
reddit.com·13h·
Discuss: r/godot
🔧Reverse Engineering
Flag this post
I stopped fearing the Linux terminal after learning these 5 commands
makeuseof.com·3h
🐧Linux
Flag this post
Announcing Magika 1.0: now faster, smarter, and rebuilt in Rust
blogger.com·1d
🐧Linux
Flag this post
Vibing Negative
theblackwall.uk·1d
🔧Reverse Engineering
Flag this post
🎲 Another one about build setups Part - II
reaper.is·7h
🏗️Software Architecture
Flag this post
Participants ready to make use of Financial literacy training
searchlight.vc·16h
💻Programming
Flag this post
Cancer; A Crime Story (and other tales of optimization gone wrong)
lesswrong.com·16h
🔧Reverse Engineering
Flag this post
Solve These Strange Jigsaws
aftermath.site·3h
🔧Reverse Engineering
Flag this post