Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
๐ง
Tor Networks
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
๐Text Chunking
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐ฃZIP Vulnerabilities
Flag this post
eBPF Rootkit
๐ก๏ธeBPF Security
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comยท1d
๐ฏNTLM Attacks
Flag this post
NEWS ROUNDUP โ 21st November 2025
digitalforensicsmagazine.comยท1d
๐จIncident Response
Flag this post
AI-Powered Postgres index suggestions
planetscale.comยท2d
๐ง Query Planners
Flag this post
rpki-client seeks โฌ300K in funding by 2026 to sustain development
discoverbsd.comยท2d
๐Operating system internals
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
๐Operating system internals
Flag this post
Microsoft is hoping to kill off its most embarrassing BSOD errors for good - farewell to big-screen outages in the wild
techradar.comยท10h
๐Operating system internals
Flag this post
Remote Forensic Collection Tools 2025
cybertriage.comยท3d
๐จIncident Response
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ญCultural Informatics
Flag this post
Data General History by Foster
๐Data Provenance
Flag this post
Accelerate investigations with AWS Security Incident Response AI-powered capabilities
๐จIncident Response
Flag this post
Reading List 11/22/25
construction-physics.comยท19h
๐ก๏ธPreservation Physics
Flag this post
Thoughts on the GigaOm Radar for Vector Databases v3
thenewstack.ioยท1d
๐๏ธVector Search
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netยท8h
๐Brotli Internals
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Hacking
Flag this post
Revisiting Manager READMEs
๐ฆFormat Metamorphosis
Flag this post
Loading...Loading more...