Custom ROM versus extensive package removal, for de-Googling a Samsung cellphone
kevinboone.meยท19h
๐ฎCartridge Archaeology
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท5d
๐ฆ Malware Analysis
Flag this post
The Louvre's surveillance system used insecure passwords such as "LOUVRE"
๐Cryptographic Archaeology
Flag this post
Defining Types for a Simple HTTP Server
mmhaskell.comยท5h
๐งBinary Parsing
Flag this post
Rhysida OysterLoader campaign leverages 40 code-signing certificates
๐ซKerberos Exploitation
Flag this post
What makes public posts about incidents different from analysis write-ups (2021)
๐จIncident Response
Flag this post
Nostr is deceptively tricky to understand
๐CBOR
Flag this post
We built a simple AI-powered tool for URL Monitoring + On-Call management โ now live (Free tier)
๐Homelab Monitoring
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
๐บZIP Archaeology
Flag this post
Finding Today's Changed Files: A Quick Python Script for File Uploads
๐คArchive Automation
Flag this post
SERVIMON: AI-Driven Predictive Maintenance and Real-Time Monitoring for Astronomical Observatories
arxiv.orgยท10h
๐๏ธObservatory Systems
Flag this post
NetBSD developer shares GSoC 2025 Mentor Summit experience in Munich
discoverbsd.comยท2d
๐กOpenBSD
Flag this post
Enhanced Slater Determinant Calculation via Hybrid Tensor Decomposition & Adaptive Mesh Refinement
๐ธ๏ธTensor Networks
Flag this post
The Hidden Ledger of Code: Tracking the Carbon Debt Inside Our Software
hackernoon.comยท2d
๐Code Metrics
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท3d
๐Hash Functions
Flag this post
Your Lead Funnel is Leaking Junk: 7 Engineering Strategies for High-Quality B2B Prospects
๐Feed Optimization
Flag this post
Belhold! My setup.
๐ HomeLab
Flag this post
Loading...Loading more...