Low-Level Hacks
🐧Linux
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·7h
🦠Malware Analysis
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
🦈Wireshark
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·22h
🦠Malware Analysis
Flag this post
Undefined Tasks
thedailywtf.com·6h
🔬Reverse Engineering
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
🔬Reverse Engineering
Flag this post
Dive into Systems
💻Computer Science
Flag this post
Playing Around with ARM Assembly
🐧Linux
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·4d
🔬Reverse Engineering
Flag this post
C++ move semantics from scratch (2022)
💻Computer Science
Flag this post
Free Functions Don't Change Performance (Much)
🐧Linux
Flag this post
Readable Code Is Unreadable
🐍Python
Flag this post
Dissecting my MiniBanners program – part 1
subethasoftware.com·17h
🔬Reverse Engineering
Flag this post
A Friendly Tour of Process Memory on Linux
🐧Linux
Flag this post
Reflections on Trusting Trust (1984)
🔬Reverse Engineering
Flag this post
Linkers: A 20 Part Series
🔬Reverse Engineering
Flag this post
Loading...Loading more...