Product comparison: Detectify vs. Intruder
blog.detectify.com·4d
🕵️Penetration Testing
MSI upgrades its magnetic pocket-sized portable SSD to 40Gbps USB4
techspot.com·7h
🧲Magnetic Recording
New and simple detection method for nanoplastics
uni-stuttgart.de·2h·
Discuss: Hacker News
💿Optical Forensics
I built an interactive bloom filter visual simulator so you can understand this data structure better
coffeebytes.dev·5d·
🌸Bloom Filters
Gemini (2023)
geminiquickst.art·13h·
Discuss: Hacker News
🔄Sync Engine
Don't vibe code (any of) your config
augmentedswe.com·1d·
Discuss: Hacker News
🔓Hacking
Stop Coding. Start Writing
rgoldfinger.com·9h·
Discuss: Hacker News
🔩Systems Programming
When Middleware Lies: The Dark Pattern of Fake Liquidity Bridges
hackernoon.com·2d
🌳Archive Merkle Trees
Made a project to integrate GPT models into directly Ghidra
github.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Unlock Privacy-First AI: Secure Voice Agents Transform Customer Experience
dev.to·13h·
Discuss: DEV
🤐Secure Multiparty
netcrypt: Secure Socket Communication & Encrypted Tunneling for Python
dev.to·4h·
Discuss: DEV
🌐NetworkProtocols
Using old parts to make a homelab/server, ideas & thoughts needed!
reddit.com·1h·
Discuss: r/homelab
🏠Homelab Archaeology
Decoding Team Synergy: The Hidden Language of Movement by Arvind Sundararajan
dev.to·10h·
Discuss: DEV
🌍Cultural Algorithms
How to Analyze and Optimize Your LLMs in 3 Steps
towardsdatascience.com·3d
🔗Constraint Handling
How to Make mspaint Say “Meow”: A Playful Guide to DLL Injection
infosecwriteups.com·1d
🪟Awesome windows command-line
Introducing db2lake: A Lightweight and Powerful ETL Framework for Node.js
dev.to·1d·
Discuss: DEV
🗄️Database Internals
Docling: The Document Alchemist
towardsdatascience.com·2d
📋Document Grammars
Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
intezer.com·4d
🔓Hacking