Testing "exotic" p2p VPN
blog.nommy.moe·7h·
🌐DNS over QUIC
Security Affairs newsletter Round 543 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·12h
🔓Hacking
DNS pivoting: Attack surface discovery through DNS
hackertarget.com·2d
🌐DNS Security
Exploiting a Race Condition to print infinite money
blog.z.org·7h·
🎫Kerberos Attacks
Brains — TryHackMe Walkthrough
infosecwriteups.com·17h
📟Terminal Forensics
It's happening again
aardvark.co.nz·5h
📡Feed Security
Monitoring AS-SETs and why they matter
blog.cloudflare.com·2d
🌐DNS over QUIC
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·3h
💿FLAC Archaeology
Lab: Protect IS-IS Routing Data with MD5 Authentication
blog.ipspace.net·2d
🛡️eBPF Security
Automatic Routing to VLAN
reddit.com·2d·
Discuss: r/homelab
🏠HomeLab
Netstack.FM Podcast
netstack.fm·1d
📡Feed Archaeology
Working at ABI boundaries
rkrishnan.org·1d
🦀Rust Borrowing
Use the Accept Header to Serve Markdown Instead of HTML to LLMs
skeptrune.com·1h·
Discuss: Hacker News
🔗Hypermedia APIs
The Collision Protocol: When Two Keys Share a Drawer
dev.to·14h·
Discuss: DEV
🔐Hash Functions
Singularity: LKM rootkit for modern kernels (6x)
github.com·3h·
Discuss: Hacker News
🔌Operating system internals
The HackerNoon Newsletter: Why You Shouldn’t Judge by PnL Alone (9/28/2025)
hackernoon.com·8h
📻Homebrew Protocols
How to Defend Against Credential Attacks with a Hybrid Mesh Architecture
blog.checkpoint.com·2d
🎫Kerberos History
Consistent hashing
eli.thegreenplace.net·1d·
Discuss: Hacker News
🌐Distributed Hash
Some interesting stuff I found on IX LANs
blog.benjojo.co.uk·3d·
🕸️Mesh Networking
HeartCrypt’s wholesale impersonation effort
news.sophos.com·2d
🎫Kerberos Exploitation