Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·1h
🔒Security
Flag this post
How Does the Internet Work? TCP/IP, DNS & Network Infrastructure Explained
the-ultimate-gadget-guide.blogspot.com·1d
🌐Network Protocols
Flag this post
AI and machine learning outside of Python
infoworld.com·6h
🌳Tree-sitter
Flag this post
[P] triplet-extract: GPU-accelerated triplet extraction via Stanford OpenIE in pure Python
🧮Vector Databases
Flag this post
Show HN: I built an edge ML system to detect and classify trick-or-treaters
👁️Computer Vision
Flag this post
Nonlinear Instabilities in Computer Network Dynamics
arxiv.org·10h
🕸️Mesh Networks
Flag this post
Voxel Grid Visibility
📐Computational Geometry
Flag this post
Balancing Cost, Power, and AI Performance
oreilly.com·20h
🚀Performance
Flag this post
Reverse Engineering Googles BotGuard
🔓Binary Exploitation
Flag this post
Grafana Mimir 3.0 release: performance improvements, a new query engine, and more
grafana.com·2d
🎴TAO
Flag this post
Can-t stop till you get enough
🦀Rust Macros
Flag this post
Playing Around with ARM Assembly
🦀Rust Macros
Flag this post
Solving a problem with mindware
lesswrong.com·1d
💬Prompt Engineering
Flag this post
I've created a leetcode for system design
🎨Design Systems
Flag this post
Loading...Loading more...