Low-Level Hacks
🐧Linux
Flag this post
[Talk] Improving the Incremental System in the Rust Compiler
blog.goose.love·10h
💻Computer Science
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·1h
🎯Penetration Testing
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·1d
🦠Malware Analysis
Flag this post
Reflections on Trusting Trust (1984)
🔬Reverse Engineering
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
🔐Cybersecurity
Flag this post
Hacking the Color BASIC PRINT command – part 7
subethasoftware.com·11h
🔬Reverse Engineering
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
🔐Cybersecurity
Flag this post
Undefined Tasks
thedailywtf.com·23h
🔬Reverse Engineering
Flag this post
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
darkreading.com·4h
🔐Cybersecurity
Flag this post
Dive into Systems
💻Computer Science
Flag this post
Playing Around with ARM Assembly
🐧Linux
Flag this post
Database Redis: Vulnerability allows execution of malicious code
heise.de·16h
💉SQL Injection
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·5d
🔬Reverse Engineering
Flag this post
Loading...Loading more...