Analysis Playbooks: USB
🦠Malware Analysis
Flag this post
Think DSP second edition
allendowney.com·17h
🐍Python
Flag this post
Defining Types for a Simple HTTP Server
mmhaskell.com·2d
🔒TLS/SSL
Flag this post
Microservices? No, modularity is what matters
🐳Docker
Flag this post
Tycoon 2FA Phishing Kit Analysis
cybereason.com·1d
🔒TLS/SSL
Flag this post
RedCodeAgent: Automatic red-teaming agent against diverse code agents
microsoft.com·17h
🎯Penetration Testing
Flag this post
Civilization Heartbeat Sentinel
🦈Wireshark
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.org·1d
🔒TLS/SSL
Flag this post
AgentBnB: A Browser-Based Cybersecurity Tabletop Exercise with Large Language Model Support and Retrieval-Aligned Scaffolding
arxiv.org·1d
🎯Penetration Testing
Flag this post
2 men accused of hacking and extorting US companies previously worked for cybersecurity firms
ketv.com·13h
🔐Cybersecurity
Flag this post
Hackers who stole trove of sensitive UPenn data derides 'dog**** elitist institution'
metacurity.com·1d
🔐Cybersecurity
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🦠Malware Analysis
Flag this post
Building and running Request Tracker as a quadlet container
developers.redhat.com·2h
🐳Docker
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
🔬Reverse Engineering
Flag this post
r/mathematics
💻Computer Science
Flag this post
SANDEVISTAN TOOLKIT
🦈Wireshark
Flag this post
Loading...Loading more...