Reverse Engineering, Binary Analysis, Control Flow Recovery, Disassembly

How we trained an ML model to detect DLL hijacking
securelist.com·7h
🏷️Memory Tagging
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.to·11h·
Discuss: DEV
🌳Pattern Match Compilation
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·21h
🏗️Cranelift
The Inverse Matrix problem
talesfrom.dev·15h
🚂Error Propagation
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·20h·
Discuss: Hacker News
🛡️Stack Safety
Nix pills
nixos.org·1d
🏗️Build Systems
Are Software Registries Inherently Insecure?
developers.slashdot.org·14h
🛡️Security Type Systems
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·3h
🏷️Memory Tagging
ROCm/TheRock
github.com·13h
🔄Cross-Compilation
WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·2h·
Discuss: Hacker News
🌐WASM Runtimes
The Best Performance Optimization Is Sometimes Changing Your Architecture
reddit.com·1d·
Discuss: r/webdev
🚀Code Motion
Automatic Building Code Review: A Case Study
arxiv.org·11h
📦Dependency Analysis
Codie's Cognitive Chronicals
dev.to·12h·
Discuss: DEV
🏺Code Archeology
Souvenir
deprogrammaticaipsum.com·12h
🔗Weak References
Tape Library and Show Off
i.redd.it·16h·
Discuss: r/homelab
🔄Deduplication
The State of CI/CD in 2025: Key Insights from the Latest JetBrains Survey
blog.jetbrains.com·3h
📦Dependency Analysis
🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s
dev.to·11h·
Discuss: DEV
🛡️Security Type Systems
Smart Specs: Automating Engineering Standards for Error-Free Design
vibe.forem.com·1d·
Discuss: DEV
Configuration Validation
built a full java desktop app with claude 4 sonnet + cursor in one sitting
teamdev.com·4h·
Discuss: r/programming
Live Coding
🔗 The basics of a release branching strategy
yellowduck.be·7h
🔪Program Slicing