Low-Level Hacks
๐งLinux
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐ฌReverse Engineering
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.comยท14m
๐SQL Injection
Flag this post
[Talk] Improving the Incremental System in the Rust Compiler
blog.goose.loveยท16h
๐ปComputer Science
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท7h
๐ฏPenetration Testing
Flag this post
A Short Survey of Compiler Backends
๐งLinux
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
๐Cybersecurity
Flag this post
How to build a Heapless Vector using `MaybeUninit<T>` for Better Performance.
๐ณDocker
Flag this post
BSD Weeklu issue 252
discoverbsd.comยท1h
๐งLinux
Flag this post
Hacking the Color BASIC PRINT command โ part 7
subethasoftware.comยท17h
๐ฌReverse Engineering
Flag this post
Undefined Tasks
thedailywtf.comยท1d
๐ฌReverse Engineering
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
๐Cybersecurity
Flag this post
Sable and Able: A Tale of Two ASIs
lesswrong.comยท6h
๐Python
Flag this post
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
darkreading.comยท10h
๐Cybersecurity
Flag this post
Loading...Loading more...