Show HN: Mathematical parameter selection to eliminate synchronization bugs
๐Vector Clocks
Flag this post
Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
๐Binary Exploitation
Flag this post
Python For Exploit Development
๐Binary Exploitation
Flag this post
I tested GPT-5.1 Codex against Sonnet 4.5, and it's about time Anthropic bros take pricing seriously.
๐ฆFolly
Flag this post
Diagonalization: A (slightly) more rigorous model of paranoia
lesswrong.comยท3h
๐ก๏ธAI Security
Flag this post
Why isnโt Rust getting more professional adoption despite being so loved?
๐ท๏ธMemory Tagging
Flag this post
Argusee: A Multi-Agent Architecture for Automated Vulnerability Discovery
๐ต๏ธJaeger
Flag this post
The โJankiestโ way of writing Ruby gems
mauricio.szabo.linkยท7h
๐ตClojure
Flag this post
Unlocking the Unsolvable: Parallel Search Algorithms Conquer Complexity by Arvind Sundararajan
๐Fractional Cascading
Flag this post
Slice-Aware Spoofing Detection in 5G Networks Using Lightweight Machine Learning
arxiv.orgยท2d
๐WireGuard
Flag this post
Node.js Security Checklist
๐Security
Flag this post
Smoothsort Demystified
โกQuicksort
Flag this post
Show HN: 1Pwned
๐Binary Exploitation
Flag this post
Building an AI Workout Coach: OpenAI Responses API + Dynamic Reasoning Levels
๐ฌPrompt Engineering
Flag this post
Loading...Loading more...