Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
reddit.com·1d·
🐛Fuzzing
Flag this post
Argusee: A Multi-Agent Architecture for Automated Vulnerability Discovery
darknavy.org·16h·
Discuss: Hacker News
🕵️Jaeger
Flag this post
Why isn’t Rust getting more professional adoption despite being so loved?
zdnet.com·5h·
Discuss: r/rust
🏷️Memory Tagging
Flag this post
The “Jankiest” way of writing Ruby gems
mauricio.szabo.link·2h
🔵Clojure
Flag this post
PHP 8.5: The Silent Web Revolution
dev.to·1h·
Discuss: DEV
🔨Incremental Compilation
Flag this post
Show HN: 1Pwned
github.com·8h·
Discuss: Hacker News
🏹Robin Hood Hashing
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·2d·
Discuss: Hacker News
🔍Reverse Engineering
Flag this post
Rust unit testing: assertion libraries
jorgeortiz.dev·1d·
Discuss: r/rust
📦Serde
Flag this post
I tested GPT-5.1 Codex against Sonnet 4.5, and it's about time Anthropic bros take pricing seriously.
composio.dev·9h·
Discuss: r/ClaudeAI
📦Folly
Flag this post
How do you guys recommend learning Zig for beginners?
pedropark99.github.io·1h·
Discuss: r/Zig
⚙️Zig
Flag this post
Protobuf Meets Valhalla: Hacking with Java Value Classes (JEP 401)
dariobalinzo.medium.com·1d·
Discuss: Hacker News
📄FlatBuffers
Flag this post
A Practical Guide to Transitioning to Memory-Safe Languages
queue.acm.org·2d·
🛡️Memory Safety
Flag this post
Xen exploitation part 1: XSA-105, from nobody to root
blog.quarkslab.com·15h·
Discuss: Hacker News
🦅Falco
Flag this post
Spec-Driven Development: The Waterfall Strikes Back
marmelab.com·23h·
Discuss: Hacker News
📚Technical Writing
Flag this post
Node.js Security Checklist
blog.risingstack.com·4h·
Discuss: Hacker News
🔒Security
Flag this post
Reproducible C++ builds by logging Git hashes
jgarby.uk·1d·
Discuss: Hacker News
🌳Git
Flag this post
Show HN: Mathematical parameter selection to eliminate synchronization bugs
news.ycombinator.com·3h·
Discuss: Hacker News
🕐Vector Clocks
Flag this post
Crims poison 150K+ npm packages with token-farming malware
theregister.com·1d·
Discuss: Hacker News
📦Trunk
Flag this post
🧠 Understanding Ransomware and Malware: How Cybercriminals Lock and Exploit Your Data
medium.com·2d·
Discuss: DEV
🦠Malware Analysis
Flag this post
Messing with bots
herman.bearblog.dev·2d·
🔎Quickwit
Flag this post