Beginner’s guide to malware analysis and reverse engineering
intezer.com·15h
🦠Malware Analysis
Is It Thinking or Cheating? Detecting Implicit Reward Hacking by Measuring Reasoning Effort
arxiv.org·7h
🧮Z3 Solver
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.com·14h
🔐PKI Archaeology
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·20h
🦠Malware Analysis
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·1d·
Discuss: Hacker News
🦠Malware Analysis
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·11h
🔧Binary Parsers
Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
theregister.com·1d
🔓Hacking
Forensic journey: hunting evil within AmCache
securelist.com·2d
🔍Binary Forensics
Product comparison: Detectify vs. Qualys
blog.detectify.com·2h
Archive Fixity
Dangerous DNS malware infects over 30,000 websites - so be on your guard
techradar.com·8m
🛣️BGP Hijacking
Rhadamanthys 0.9.x – walk through the updates
research.checkpoint.com·2d
🧬Bitstream Evolution
What Makes a Language Look Like Itself?
towardsdatascience.com·21h
🔤Character Classification
Spot trouble early with honeypots and Suricata
pentestpartners.com·1d
🛡️eBPF Security
Biothreat hunters catch dangerous DNA before it gets made
nature.com·17h
🌸Bloom Variants
Why your Mac is next: how amateur data stealers became a business
jamf.com·2d
📟Terminal Forensics
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·13h·
Discuss: Hacker News
🧠Lisp Dialects
Google warns of Cl0p extortion campaign against Oracle E-Business users
securityaffairs.com·6h
🎫Kerberos Attacks
Claude Code: Unix Philosophy Makes AI Coding Better
dev.to·1d·
Discuss: DEV
Proof Automation
Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm
aws.amazon.com·18h
🔗Supply Chain