011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
Registry Analysis
windowsir.blogspot.com·6h·
🔍NTLM Archaeology
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
EY 4TB Data Leak
neosecurity.nl·1d·
Discuss: Hacker News
🔓Hacking
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·1d
🕵️Steganographic Archives
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·2h
🧪Property-Based Testing
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·2d
🔍Audio Forensics
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.io·5h
📟Terminal Forensics
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·22h
🌳Archive Merkle Trees
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
IFS Fractal codec
codecs.multimedia.cx·8h
🌀Fractal Compression
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·1d·
Discuss: Substack
🧪Binary Fuzzing
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
Today I Learned: Binfmt_misc
dfir.ch·10h·
Discuss: Hacker News
🐚Nordic Shell
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Cut the Noise, Keep the Signal: The Hidden Cost of Duplicate Reports
hackerone.com·2d
Archive Fixity
Flag this post