HydraPWK2 Is a Linux Distribution That Simplifies Pentesting
thenewstack.ioยท16h
๐ก๏ธeBPF Security
Flag this post
This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.comยท1d
๐Cryptographic Archaeology
Flag this post
Notes from RIPE 91
blog.apnic.netยท3d
๐DNS over QUIC
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
๐ฏThreat Hunting
Flag this post
Geeta landed Google for $672,000
๐Terminal Forensics
Flag this post
Show HN: I built a tool to version control datasets (like Git, but for data)
๐ฆGit LFS
Flag this post
Speedrunning an RL Environment
โ๏ธLean Tactics
Flag this post
Relevant โ TryHackMe Room Walkthrough
infosecwriteups.comยท3d
๐ฏNTLM Attacks
Flag this post
Inferring trust in recommendation systems from brain, behavioural, and physiological data
arxiv.orgยท3h
๐Vector Forensics
Flag this post
I built a JBOD from a dead r710
โกCircuit Archaeology
Flag this post
AstuteRAG-FQA: Task-Aware Retrieval-Augmented Generation Framework for Proprietary Data Challenges in Financial Question Answering
arxiv.orgยท3h
๐BitFunnel
Flag this post
Automated Starlink Installation Procedure Validation via Bayesian Network Inference
๐กNetwork Protocol Design
Flag this post
my tech restart
๐Operating system internals
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.comยท1d
๐ต๏ธVector Smuggling
Flag this post
Loading...Loading more...