kemanon's Top FindsLoading...
The InsightOS architecture
feedly.com·22h
🐧Linux
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·1d·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Embedding TypeScript
andrews.substack.com·1h·
Flag this post
Building our geospatial database in production
radar.com·20h·
Discuss: Hacker News
🛣️BGP
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·3d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
8 Top Application Security Tools (2026 Edition)
hackread.com·3d
🦠Malware Analysis
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.org·2d
🔬Reverse Engineering
Flag this post
Hackers are teaming up with organized crime gangs to steal cargo right from supply chains
techradar.com·1d
🔐Cybersecurity
Flag this post
Gmail Credentials Appear in Massive 183 Million Infostealer Data Leak, but Google Confirms No New Breach
blogger.com·20h
🔐Cybersecurity
Flag this post
🎙️ Building a Text-to-Speech (TTS) GUI with Python
dev.to·20h·
Discuss: DEV
🐍Python
Flag this post
Confidential Computing To Secure AI Workloads
semiengineering.com·3h
Flag this post
An Analysis of Early-Stage Functional Safety Analysis Methods and Their Integration into Model-Based Systems Engineering
arxiv.org·7h
Flag this post
Networking in the Standard Library is a terrible idea
reddit.com·2d·
Discuss: r/cpp
🌐Networking
Flag this post
🧑‍🚀 Mission Accomplished: How an Engineer-Astronaut Prepared Meta’s CRAG Benchmark for Launch in Docker
dev.to·55m·
Discuss: DEV
🐳Docker
Flag this post
DAFU🦉 Infrastructure Revolution: Docker, CLI, and Enterprise Automation Are Here! 🚀
dev.to·2d·
Discuss: DEV
🐳Docker
Flag this post
ServBay for Windows 1.11.1 Released: Refactoring the Core Experience for Unprecedented Flexibility and Efficiency
dev.to·1h·
Discuss: DEV
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·19h
🦠Malware Analysis
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·2d
🦠Malware Analysis
Flag this post
Introducing Spira - Making a Shell #0
github.com·2d·
Discuss: DEV
🐧Linux
Flag this post
Implementing JWT Authentication in Rust using Axum
dev.to·2d·
Discuss: DEV
🔒TLS/SSL
Flag this post