Tycoon 2FA Phishing Kit Analysis
cybereason.com·7h
🎫Kerberos Attacks
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·4d
🔓Decompilation
Flag this post
0055: consulting, sql needed structure, slow forum, on the line, out of thin air, papers, other stuff
scattered-thoughts.net·3d
🦀Rust Macros
Flag this post
Programming for Computations: Matlab/Octave
📐Error Bounds
Flag this post
Show HN: I built an SEO tool that uses embeddings to analyze content relevance
📊Search Ranking
Flag this post
How to Use Multimodal AI Models With Docker Model Runner
docker.com·11h
🎙️Whisper
Flag this post
D.J. Bernstein: The Good News Archive
🔓Hacking
Flag this post
The Case That A.I. Is Thinking
🔲Cellular Automata
Flag this post
UNILocPro: Unified Localization Integrating Model-Based Geometry and Channel Charting
arxiv.org·20h
📡Bluetooth Archaeology
Flag this post
Defeating KASLR by Doing Nothing at All
🏷️Memory Tagging
Flag this post
Helios-Engine ,Why I Built Another LLM Agent Framework (And Why You Might Actually Care)
🦀Rust Borrowing
Flag this post
3rd November – Threat Intelligence Report
research.checkpoint.com·15h
🔓Hacking
Flag this post
3 Experiments That Reveal the Shocking Inner Life of AI Introduction: Is Anybody Home?
hackernoon.com·2h
🚀Indie Hacking
Flag this post
Hierarchical Chromosome Segmentation via Adaptive Spectral Graph Convolutional Networks
🌀Hyperbolic Geometry
Flag this post
Scaling Coding-Agent RL to 32x H100s. 160% Improvement on Stanford's TBench
⚔️Lean Tactics
Flag this post
Smaller Surfaces
📏Code Metrics
Flag this post
Small Vs. Large Language Models
💻Local LLMs
Flag this post
Loading...Loading more...