Beginner’s guide to malware analysis and reverse engineering
intezer.com·17h
🦠Malware Analysis
Is It Thinking or Cheating? Detecting Implicit Reward Hacking by Measuring Reasoning Effort
arxiv.org·9h
🧮Z3 Solver
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.com·16h
🔐PKI Archaeology
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·22h
🦠Malware Analysis
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·1d·
Discuss: Hacker News
🦠Malware Analysis
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·1h
🏴‍☠️Piracy
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·13h
🔧Binary Parsers
Forensic journey: hunting evil within AmCache
securelist.com·2d
🔍Binary Forensics
Product comparison: Detectify vs. Qualys
blog.detectify.com·4h
Archive Fixity
Rhadamanthys 0.9.x – walk through the updates
research.checkpoint.com·2d
🧬Bitstream Evolution
Nucleic acid biosecurity screening against generative protein design tools
science.org·1h·
Discuss: Hacker News
🔲Cellular Automata
What Makes a Language Look Like Itself?
towardsdatascience.com·23h
🔤Character Classification
Spot trouble early with honeypots and Suricata
pentestpartners.com·1d
🛡️eBPF Security
Google warns of Cl0p extortion campaign against Oracle E-Business users
securityaffairs.com·8h
🎫Kerberos Attacks
Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
theregister.com·1d
🔓Hacking
Microsoft's Voice Clone Becomes Scary & Unsalvageable
darkreading.com·45m
🎙️Whisper
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·16h·
Discuss: Hacker News
🧠Lisp Dialects
Claude Code: Unix Philosophy Makes AI Coding Better
dev.to·1d·
Discuss: DEV
Proof Automation
Dangerous DNS malware infects over 30,000 websites - so be on your guard
techradar.com·2h
🛣️BGP Hijacking