Cracking Forensics CTFs 1.0 โ€” picoCTF
infosecwriteups.comยท1d
๐Ÿ”ฌArchive Forensics
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cxยท1dยท
Discuss: Hacker News
๐Ÿ”ฌBinary Analysis
NightMARE on 0xelm Street, a guided tour
elastic.coยท1d
๐ŸงชBinary Fuzzing
Digital Forensics Round-Up, September 10 2025
forensicfocus.comยท2d
โš–๏ธDigital Evidence
Fclones โ€“ Efficient Duplicate File Finder
github.comยท16hยท
Discuss: Hacker News
๐Ÿ—„๏ธFile Systems
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comยท2d
๐Ÿฆ Malware Analysis
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comยท21h
๐Ÿ”“Hacking
Statistical methods in variety testing
cameroncounts.wordpress.comยท18h
๐Ÿ”Polish Cryptanalysis
What is Data Exfiltration and How to Prevent It
securityscorecard.comยท14h
๐Ÿ•ณ๏ธInformation Leakage
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
welivesecurity.comยท1d
๐Ÿ”’Secure Boot
UTF-8 as told by Rob Pike
doc.cat-v.orgยท2hยท
Discuss: Hacker News
๐Ÿ”คCharacter Encoding
Youโ€™re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.comยท22h
๐ŸŽซKerberos Attacks
Decompiling the GPL violated Linux kernel using Evolutionary Algorithms
far.chickenkiller.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Antivirus maxing out 8 threads
forums.anandtech.comยท10h
๐Ÿง Memory Forensics
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comยท22h
๐ŸŽซKerberos Exploitation
CEFS: Finally Solving CE's Mount(ing) Problems
xania.orgยท1d
๐Ÿ”—Archive Combinators
ChillyHell: A Deep Dive into a Modular macOS Backdoor
jamf.comยท2d
๐Ÿ“ŸTerminal Forensics
Homelab Virgin
reddit.comยท7hยท
Discuss: r/homelab
๐Ÿ Homelab Preservation