Beginner’s guide to malware analysis and reverse engineering
intezer.com·13h
🦠Malware Analysis
Is It Thinking or Cheating? Detecting Implicit Reward Hacking by Measuring Reasoning Effort
arxiv.org·5h
🧮Z3 Solver
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.com·11h
🔐PKI Archaeology
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·18h
🦠Malware Analysis
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·1d·
Discuss: Hacker News
🦠Malware Analysis
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·9h
🔧Binary Parsers
Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
theregister.com·23h
🔓Hacking
Forensic journey: hunting evil within AmCache
securelist.com·1d
🔍Binary Forensics
Rhadamanthys 0.9.x – walk through the updates
research.checkpoint.com·2d
🧬Bitstream Evolution
What Makes a Language Look Like Itself?
towardsdatascience.com·19h
🔤Character Classification
Spot trouble early with honeypots and Suricata
pentestpartners.com·23h
🛡️eBPF Security
Google warns of Cl0p extortion campaign against Oracle E-Business users
securityaffairs.com·3h
🎫Kerberos Attacks
Biothreat hunters catch dangerous DNA before it gets made
nature.com·14h
🌸Bloom Variants
Why your Mac is next: how amateur data stealers became a business
jamf.com·2d
📟Terminal Forensics
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·11h·
Discuss: Hacker News
🧠Lisp Dialects
Claude Code: Unix Philosophy Makes AI Coding Better
dev.to·1d·
Discuss: DEV
Proof Automation
Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm
aws.amazon.com·16h
🔗Supply Chain
AI-Powered Shelf Price Verification: Matching Label Prices to POS Server Prices
blog.roboflow.com·22h·
Discuss: Hacker News
Proof Automation
Gernot's List of Systems Benchmarking Crimes
gernot-heiser.org·1d·
🎯Performance Forensics