Low-Level Hacks
blog.raycursive.com·1d·
Discuss: Hacker News
🐧Linux
Flag this post
When Oracle Got Hacked (and the Hackers Fought Each Other)
dev.to·1h·
Discuss: DEV
🔐Cybersecurity
Flag this post
100 Techniques for Writing Readable Rust Code
github.com·2h·
Discuss: r/rust
🐧Linux
Flag this post
[Talk] Improving the Incremental System in the Rust Compiler
blog.goose.love·10h
💻Computer Science
Flag this post
Porting Lean to the ESP32-C3 RISC-V Microcontroller
kuruczgy.com·5h·
🐧Linux
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·1h
🎯Penetration Testing
Flag this post
Personal Standard Library - Generic and Type-Safe Containers
reddit.com·8h·
🔐Cryptography
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·1d
🦠Malware Analysis
Flag this post
Reflections on Trusting Trust (1984)
web.archive.org·2d·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.ai·14h·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
How to build a Heapless Vector using `MaybeUninit<T>` for Better Performance.
dev.to·17h·
Discuss: DEV
🐳Docker
Flag this post
Hacking the Color BASIC PRINT command – part 7
subethasoftware.com·11h
🔬Reverse Engineering
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
mensfeld.pl·17h·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Undefined Tasks
thedailywtf.com·23h
🔬Reverse Engineering
Flag this post
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
darkreading.com·4h
🔐Cybersecurity
Flag this post
Dive into Systems
diveintosystems.org·1d·
Discuss: Hacker News
💻Computer Science
Flag this post
Autark: Rethinking build systems – Integrate, Don't Outsource
blog.annapurna.cc·14h·
Discuss: Hacker News
🐧Linux
Flag this post
Playing Around with ARM Assembly
blog.nobaralabs.com·1d·
Discuss: Hacker News
🐧Linux
Flag this post
Database Redis: Vulnerability allows execution of malicious code
heise.de·16h
💉SQL Injection
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·5d
🔬Reverse Engineering
Flag this post