Show HN: Why We're Building Creativity and Game Dev Clubs for Kids
๐ปComputer Science
Flag this post
Reverse Vibe Coding
๐Python
Flag this post
Risky Business #813 -- FFmpeg has a point
risky.bizยท13h
๐ฆ Malware Analysis
Flag this post
Analysis of Iterative Deblurring: No Explicit Noise
arxiv.orgยท12h
๐ฌReverse Engineering
Flag this post
DPO-F+: Aligning Code Repair Feedback with Developers' Preferences
arxiv.orgยท1d
๐ฌReverse Engineering
Flag this post
Beyond the Flame Chart: Chrome DevTools' New AI Instantly Pinpoints Your Site's Performance Issues
๐Python
Flag this post
How Hidden Code Decides Who's in Charge: The Silent Governance of AI Through Function-Calling Schemas
๐Cybersecurity
Flag this post
I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed
๐ฌReverse Engineering
Flag this post
Enhancing LOD Integrity via Hyperdimensional Semantic Graph Normalization & Automated Anomaly Detection
๐Python
Flag this post
How humans are actually using AI: Beyond the corporate narrative
๐ฏPenetration Testing
Flag this post
Choosing the best AI coding agent for Bitrise
๐Python
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.comยท2d
๐ฆ Malware Analysis
Flag this post
Quantum Machine Unlearning: Foundations, Mechanisms, and Taxonomy
arxiv.orgยท1d
๐Cryptography
Flag this post
Legible vs. Illegible AI Safety Problems
lesswrong.comยท19h
๐Cybersecurity
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.comยท1d
๐TLS/SSL
Flag this post
Navigating the Storm: Driving AI Agents
๐Python
Flag this post
Loading...Loading more...