NSA Tool, Decompiler, Reverse Engineering, Software Analysis

A lot of ‘free’ PC software is risky. Use these alternatives instead
nordot.app·7h
🦠Malware Analysis
Flag this post
We will WARC you: preserving access to published CD-ROMs at NLA
dpconline.org·1h
🦈Wireshark
Flag this post
How a Nix flake made our polyglot stack (and new dev onboarding) fast and sane
fiveonefour.com·3h·
Discuss: Hacker News
🐧Linux
Flag this post
Creating Lisp Systems
renato.athaydes.com·14h·
Discuss: Hacker News
🐧Linux
Flag this post
ChatGPT Pulse is my favorite product of the year....
manton.org·1h
🐍Python
Flag this post
How Cursor AI Slashed Dashboard Migration Time 75% Across 240 Queries
engineering.salesforce.com·3h
🔬Reverse Engineering
Flag this post
Dive into Systems
diveintosystems.org·2d·
Discuss: Hacker News
💻Computer Science
Flag this post
Makefile vs. YAML: Modernizing verification simulation flows
edn.com·2d
🔬Reverse Engineering
Flag this post
The Exhaust Port of Cohesion: Precision Provocation in LLMs
blog.gopenai.com·1d·
Discuss: Hacker News
🐍Python
Flag this post
From Theory to Practice: Introducing Architectural Prisms, an Experiment in AI-First Academic Dialogue
sigarch.org·7h
💻Computer Science
Flag this post
We found embedding indexing bottleneck in the least expected place: JSON parsing
nixiesearch.substack.com·2d·
Discuss: Substack
🐍Python
Flag this post
I've created a leetcode-like platform for system design
systemstudio.app·8h·
Discuss: DEV
🐧Linux
Flag this post
Beyond the "Vibe Check": How to Use the Web Codegen Scorer to Master AI-Generated Code
dev.to·2h·
Discuss: DEV
🎯Penetration Testing
Flag this post
3rd party library management tool
reddit.com·2d·
Discuss: r/selfhosted
🔬Reverse Engineering
Flag this post
KAPLAN — Stealthy Bulk Fetching Over Tor for Red Team Ops
dev.to·8h·
Discuss: DEV
🦈Wireshark
Flag this post
Observability Made Easy: How AI & OpenTelemetry Tame Tool Sprawl
dev.to·1d·
Discuss: DEV
🦈Wireshark
Flag this post
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
theregister.com·7h
🦠Malware Analysis
Flag this post
DPO-F+: Aligning Code Repair Feedback with Developers' Preferences
arxiv.org·1d
🔬Reverse Engineering
Flag this post
What I Learned From Working on Legacy Codebases (And How It Made Me a Better Developer)
dev.to·2h·
Discuss: DEV
🔬Reverse Engineering
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·1d
🐍Python
Flag this post