The 1337 PNG Hashquine (2022)
hackaday.com·21h·
Discuss: Hacker News
🔐Cryptography
Flag this post
Critical UniFi OS Flaw Enables Remote Code Execution
gbhackers.com·21h·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Insecure Direct Object References (IDOR): The $1 Billion Authorization Bug 🔢
instatunnel.my·8h·
Discuss: r/devops
💉SQL Injection
Flag this post
Reforging the ReScript Build System
rescript-lang.org·20h·
🔬Reverse Engineering
Flag this post
I effed up so bad what on earth do I do (opened a harmful exe)
reddit.com·3h·
Discuss: r/Piracy
🔐Cybersecurity
Flag this post
A Friendly Tour of Process Memory on Linux
0xkato.xyz·1d·
Discuss: Hacker News
🐧Linux
Flag this post
C++ move semantics from scratch (2022)
cbarrete.com·1d·
💻Computer Science
Flag this post
AMD Confirms RDSEED Security Flaw In Zen 5 CPUs & Details Mitigation Plan
hothardware.com·16h
💉SQL Injection
Flag this post
AI Slop vs. OSS Security
devansh.bearblog.dev·14h·
Discuss: Hacker News
🎯Penetration Testing
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.com·1d·
Discuss: Hacker News
🦈Wireshark
Flag this post
Flatpak Happenings
blog.sebastianwick.net·35m·
Discuss: r/linux
🐧Linux
Flag this post
Cons Should Not Cons Its Arguments, Part II: Cheney on the MTA
web.archive.org·2d·
Discuss: Hacker News
💻Computer Science
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·1d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Benchmarking the cost of Java's EnumSet - A Second Look
kinnen.de·16h·
Discuss: r/programming
🔬Reverse Engineering
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·3h·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Readable Code Is Unreadable
blog.wilsonb.com·1d·
Discuss: Hacker News
🐍Python
Flag this post
Linkers: A 20 Part Series
airs.com·1d·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
DPO-F+: Aligning Code Repair Feedback with Developers' Preferences
arxiv.org·1d
🔬Reverse Engineering
Flag this post
Russian spies pack custom malware into hidden VMs on Windows machines
theregister.com·17h
🦠Malware Analysis
Flag this post
100 Techniques for Writing Readable Rust Code
reddit.com·8h·
Discuss: r/rust
🔬Reverse Engineering
Flag this post