Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·7m
🔧Binary Parsers
What could go wrong when MySQL strict SQL mode is off?
synacktiv.com·15h
Format Verification
ThinkBrake: Mitigating Overthinking in Tool Reasoning
arxiv.org·20h
🧮Z3 Solver
Fuzzypass: Hacking Your Brain to Remember 100 Bits of Entropy
lockeidentity.com·23h·
Discuss: Hacker News
🔓Password Cracking
The eBPF Verifier – How Linux Safely Runs User Code in Kernel Space
qpoint.io·2d·
Discuss: Hacker News
🛡️eBPF Security
Defending LLM applications against Unicode character smuggling
aws.amazon.com·2d
🔤Character Encoding
Creating an IGCSE Pseudocode Interpreter
ezntek.com·1d·
Discuss: Lobsters
🌳Incremental Parsing
Beginner’s guide to malware analysis and reverse engineering
intezer.com·4h
🦠Malware Analysis
Tales from the Interview: Tic Tac Whoa
thedailywtf.com·17h
🧪Hardware Fuzzing
Wombat's Book of Nix
mhwombat.codeberg.page·5h·
nix
Building High-Performance TCP Servers in Go: Custom Binary Protocols for Ultra-Low Latency Applications
dev.to·14h·
Discuss: DEV
🌊Streaming Systems
What Makes a Language Look Like Itself?
towardsdatascience.com·10h
🔤Character Classification
Node.js Performance: Processing 14GB Files 78% Faster with Buffer Optimization
pmbanugo.me·1d·
Discuss: Hacker News
🌊Stream Processing
MinMax vs Standard vs Robust Scaler: Which One Wins for Skewed Data?
machinelearningmastery.com·1d
🔗Tailscale
Foreground vs. Background: Analyzing Typographic Attack Placement in Autonomous Driving Systems
hackernoon.com·1d
🔍Character Forensics
OpenSSL patches 3 vulnerabilities, urging immediate updates
securityaffairs.com·1d
💣ZIP Vulnerabilities
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·2h·
Discuss: Hacker News
🧠Lisp Dialects
GNU libmicrohttpd2 Audit Complete!
ostif.org·2d
🛡️eBPF Security
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·12h
🧠Memory Forensics