Product comparison: Detectify vs. Invicti
blog.detectify.comยท2h
โ
Archive Fixity
Flag this post
What's different about my RSS reader
olano.devยท16h
๐ฐRSS Reading Practices
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท2d
๐Hacking
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
๐Concolic Testing
Flag this post
Our newest model: Chandra (OCR)
๐คAdvanced OCR
Flag this post
Can-t stop till you get enough
๐ฆRust Macros
Flag this post
Chain of Pattern: Rethink
๐Code Metrics
Flag this post
When Logs Become Chains: The Hidden Danger of Synchronous Logging
๐Stream Processing
Flag this post
THE LEAN MEAN MEME MACHINE
โ๏ธFeed Ranking
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Complex System Simulations via Adaptive Bayesian Networks
โกIncremental Computation
Flag this post
Oops, My UUIDs Collided
๐งชBinary Fuzzing
Flag this post
Show HN: I built an SEO tool that uses embeddings to analyze content relevance
๐Search Ranking
Flag this post
Byzantine Attacks in RIS-Enhanced Cooperative Spectrum Sensing: A Decision Fusion Perspective
arxiv.orgยท8h
๐ก๏ธByzantine Fault Tolerance
Flag this post
Show HN: KeyLeak Detector โ Scan websites for exposed API keys and secrets
๐ฆ Malware Analysis
Flag this post
MCP standard
๐บProtocol Archaeology
Flag this post
Automated Scientific Literature Validation via Hyperdimensional Semantic Analysis
๐Digital Philology
Flag this post
Building UnisonDB a DynamoDB-Inspired Database in Go with 100+ Edge Replication
๐๏ธDatabase Sharding
Flag this post
Vibecoding my way to a crit on GitHub
โ๏ธNix Flakes
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comยท14h
๐Hash Chains
Flag this post
Loading...Loading more...