How to get the GOT address from a PLT stub using GDB
rafaelbeirigo.github.io·1d·
Discuss: Hacker News
🔧programming language design
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.com·16h
📲local-first software
Flag this post
I Think My Parents Made an Expensive Mistake When They Bought Their House. I Want to Help Them Fix It.
slate.com·9h
🧮Algebraic Effects
Flag this post
New ATO debt campaign has some seniors anxious about sudden repayment demands
seniorsdiscountclub.com.au·11h
🧮Algebraic Effects
Flag this post
Patterns for Defensive Programming in Rust
corrode.dev·2d·
🔧programming language design
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·4d
🔄Functional Programming
Flag this post
Bring Your Own Key (BYOK) Is Coming Soon to JetBrains AI
blog.jetbrains.com·9h
🔧programming language design
Flag this post
How to Not Get Acquired
allenpike.com·9h·
Discuss: Hacker News
📲local-first software
Flag this post
Doo: A Simple, Fast Programming Language Built on Rust and LLVM
news.ycombinator.com·16h·
Discuss: Hacker News
🔧programming language design
Flag this post
How I Built "Backend Mentor" My First Hands-On Integration with Mastra
dev.to·7h·
Discuss: DEV
📲local-first software
Flag this post
Dive into Systems
diveintosystems.org·8h·
Discuss: Hacker News
🔧programming language design
Flag this post
A Friendly Tour of Process Memory on Linux
0xkato.xyz·2h·
Discuss: Hacker News
🔧programming language design
Flag this post
The Life and Death of Variables: Memory Management in JS
dev.to·13h·
Discuss: DEV
🔧programming language design
Flag this post
Speeding up JavaScript test time 1000x
kevin.burke.dev·10h·
Discuss: Hacker News
🧰software development practices
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·4d
🔧programming language design
Flag this post
Enforcing Architecture in an Agent-Driven Codebase
phoebe.work·9h·
Discuss: Hacker News
🧰software development practices
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·7h·
Discuss: Hacker News
📲local-first software
Flag this post
How Transformer Models Detect Anomalies in System Logs
hackernoon.com·7h
🧮Algebraic Effects
Flag this post
Lock In | Weeknotes
thejaymo.net·4h
🔧programming language design
Flag this post
Josef Machytka: PostgreSQL 18 enables data‑checksums by default
credativ.de·15h
🔧programming language design
Flag this post