Becoming a Core Developer
stefaniemolin.com·17h
🐍Python
Flag this post
Parsing with zippers improves parsing with derivatives
dl.acm.org·1d·
Discuss: Hacker News
🐍Python
Flag this post
Kinly launches publicly available open AV security standards
madcornishprojectionist.co.uk·3h
🔐Cybersecurity
Flag this post
A New Faster Algorithm for Gregorian Date Conversion
benjoffe.com·3h·
Discuss: Hacker News
🐍Python
Flag this post
Speedrunning an RL Environment
sidb.in·1d·
Discuss: Hacker News
🐍Python
Flag this post
How to find DNN Software installations on your network
runzero.com·2d
🦈Wireshark
Flag this post
Why should I accept all cookies?
idiallo.com·1d·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Business Logic Flaws: The Vulnerabilities No Scanner Can Find 🧩
instatunnel.my·4d·
Discuss: r/devops
🎯Penetration Testing
Flag this post
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
blogger.com·22h
🔐Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·2d
🔐Cybersecurity
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·2d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Title cannot be empty
reddit.com·3h·
Discuss: r/APEXracers
🔐Cybersecurity
Flag this post
I Will Not Be Enabling Full Null Support In Adobe ColdFusion 2025
bennadel.com·2d
🔐Cybersecurity
Flag this post
How to Build a User Authentication System
dev.to·3h·
Discuss: DEV
🔐Cybersecurity
Flag this post
Cells, Queries, and Chaos: The Game of Life in SQL!
dev.to·20h·
Discuss: DEV
💻Computer Science
Flag this post
How to validate business logic
event-driven.io·5d
🔐Cybersecurity
Flag this post
REMI: PostgreSQL as Agentic Core in Tiger Cloud (Agentic Postgres Challenge by Auth0)
dev.to·16h·
Discuss: DEV
🐍Python
Flag this post
AI scrapers request commented scripts
cryptography.dog·2d·
🦠Malware Analysis
Flag this post
GDScript is too good for me to give it up.
reddit.com·1d·
Discuss: r/godot
🐍Python
Flag this post