Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.comΒ·4hΒ·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comΒ·1d
πŸ”Hash Functions
Flag this post
Registry Analysis
windowsir.blogspot.comΒ·1dΒ·
πŸ”NTLM Archaeology
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·1d
πŸ›‘οΈeBPF Security
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comΒ·2d
🦠Malware Analysis
Flag this post
FFpropaganda
codecs.multimedia.cxΒ·22h
🎞️FFmpeg Filters
Flag this post
This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.comΒ·10h
πŸ”Cryptographic Archaeology
Flag this post
Automating Documentation Maintenance with Prodigy: A Real-World Case Study
dev.toΒ·23hΒ·
Discuss: DEV
πŸ€–Archive Automation
Flag this post
Text rendering and effects using GPU-computed distances
blog.pkh.meΒ·9h
πŸ“Mathematical Art
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comΒ·2d
πŸ•΅οΈSteganographic Archives
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comΒ·2d
πŸ”“Decompilation
Flag this post
Writing an Asciidoc Parser in Rust: Asciidocr
bikesbooksandbullshit.comΒ·49mΒ·
Discuss: Hacker News
πŸ¦€Rust Macros
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.comΒ·3d
πŸ”Audio Forensics
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioΒ·1d
πŸ“ŸTerminal Forensics
Flag this post
2025 Component Abuse Challenge: A Transistor As A Voltage Reference
hackaday.comΒ·7h
βš™οΈDIY Electronics
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techΒ·3hΒ·
πŸ”ŒInterface Evolution
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comΒ·2d
🌳Archive Merkle Trees
Flag this post
EY 4TB Data Leak
neosecurity.nlΒ·2dΒ·
Discuss: Hacker News
πŸ”“Hacking
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.comΒ·12h
πŸ•΅οΈVector Smuggling
Flag this post
Windows Defender vs Avast: The Better Choice?
forums.anandtech.comΒ·18h
πŸ•ΈοΈWASM Archives
Flag this post