The art of (VM) firmware logging
Flag this post
You Can Get This Retropian Retro Gaming Console With 20,000 Classic Games on Sale for Just $90
lifehacker.com·14h
Flag this post
Abusing Delegation with Impacket (Part 2): Constrained Delegation
blackhillsinfosec.com·22h
Flag this post
The Law of Leaky Abstractions
Flag this post
Modelling data with relations
snell-pym.org.uk·1d
Flag this post
This adorable ESP32 project is the coolest way to show off your pixel art
xda-developers.com·5h
Flag this post
Google killed old Nest thermostats, but hackers are making them work again
howtogeek.com·1d
Flag this post
How do you self-host your own privacy tools to keep data out of third-party hands? Begineer friendly advice please
Flag this post
Tiny Plaintext-based Password Manager
Flag this post
The "it's a clone" comments are really getting me down and I hope they stop.
🔧reverse engineering
Flag this post
Phishing Tool Uses Smart Redirects to Bypass Detection
darkreading.com·20h
Flag this post
Improving the accuracy and generalizability of molecular property regression models with a substructure-substitution-rule-informed framework
arxiv.org·1d
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.org·1d
Flag this post
The Indie Path
🔧reverse engineering
Flag this post
Large Language Models for Scientific Idea Generation: A Creativity-Centered Survey
arxiv.org·1d
Flag this post
Loading...Loading more...