Testing "exotic" p2p VPN
blog.nommy.moe·5h·
🌐DNS over QUIC
Security Affairs newsletter Round 543 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·9h
🔓Hacking
DNS pivoting: Attack surface discovery through DNS
hackertarget.com·2d
🌐DNS Security
Brains — TryHackMe Walkthrough
infosecwriteups.com·14h
📟Terminal Forensics
It's happening again
aardvark.co.nz·2h
📡Feed Security
The Collision Protocol: When Two Keys Share a Drawer
dev.to·11h·
Discuss: DEV
🔐Hash Functions
dotnet tool with TUI for lightweight on-demand Kubernetes port forwarding
reddit.com·22h·
Discuss: r/kubernetes
📦Container Security
Monitoring AS-SETs and why they matter
blog.cloudflare.com·2d
🌐DNS over QUIC
Singularity: LKM rootkit for modern kernels (6x)
github.com·43m·
Discuss: Hacker News
🔌Operating system internals
Lab: Protect IS-IS Routing Data with MD5 Authentication
blog.ipspace.net·2d
🛡️eBPF Security
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·1h
💿FLAC Archaeology
Netstack.FM Podcast
netstack.fm·1d
📡Feed Archaeology
Working at ABI boundaries
rkrishnan.org·22h
🦀Rust Borrowing
How to Defend Against Credential Attacks with a Hybrid Mesh Architecture
blog.checkpoint.com·2d
🎫Kerberos History
A little more privacy centric DNS setup for home users
thelazysre.com·1d·
Discuss: Hacker News
🌐DNS over QUIC
Consistent hashing
eli.thegreenplace.net·1d·
Discuss: Hacker News
🌐Distributed Hash
Some interesting stuff I found on IX LANs
blog.benjojo.co.uk·3d·
🕸️Mesh Networking
HeartCrypt’s wholesale impersonation effort
news.sophos.com·2d
🎫Kerberos Exploitation
Threat Insights: Active Exploitation of Cisco ASA Zero Days
unit42.paloaltonetworks.com·2d
🔓Hacking