Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post
Registry Analysis
windowsir.blogspot.comยท8hยท
๐Ÿ”NTLM Archaeology
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.comยท1d
๐Ÿ”งRISC-V Assembler
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Ÿ”Hash Functions
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioยท8h
๐Ÿ“ŸTerminal Forensics
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.comยท8hยท
Discuss: Hacker News
โš™๏ธDIY Electronics
Flag this post
Advanced 3D IC Heterogeneous Integration Analysis via Bayesian Optimization and AI-Driven Defect Mapping
dev.toยท5hยท
Discuss: DEV
๐Ÿ”งHardware Verification
Flag this post
My first fifteen compilers (2019)
blog.sigplan.orgยท1hยท
Discuss: Hacker News
๐Ÿ—๏ธCompiler Archaeology
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.comยท7h
๐Ÿ“„Document Digitization
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท5h
๐Ÿ”“Hacking
Flag this post
MSAB Whitepaper โ€“ Investigating RAM In A Mobile Device
forensicfocus.comยท1d
๐Ÿง Memory Forensics
Flag this post
Building Up And Sanding Down
endler.devยท22h
๐Ÿ”ฉSystems Programming
Flag this post
Debug like a boss: 10 debugging hacks for developers, quality engineers, testers
ministryoftesting.comยท7hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.comยท3hยท
๐Ÿ—‚Data structures
Flag this post
From Bottleneck to Breakthrough: AI in Chip Verification
spectrum.ieee.orgยท1d
๐Ÿ”งHardware Verification
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Request for Quote for Data Recovery from a 512GB SSD
dolphindatalab.comยท19h
๐Ÿ’พFloppy Imaging
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท13h
๐Ÿ›ก๏ธeBPF Security
Flag this post
An 18-Year-Old Codebase Left Smart Buildings Wide Open
darkreading.comยท1d
๐Ÿ”“Hacking
Flag this post