Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.org·19h
Effect Handlers
A new breed of analyzers
daniel.haxx.se·11h·
🐛Fuzzing
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·15h
📞Session Types
Build an Unbreakable EVM Read Stack in Python: Async Web3.py, ABIs, Proxies, and Decimals
dev.to·4h·
Discuss: DEV
🔌Interface Evolution
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·1d
🛡️eBPF Security
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·23h
🌊Streaming Systems
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·9h
🔓Hacking
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
APRS over LoRa with RNode | unsigned.io
unsigned.io·12h
📻Homebrew Protocols
GHC Developer Blog: GHC 9.14.1-alpha3 is now available
haskell.org·1d
🔗Functional Compilers
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·3d
🦀Rust Macros
Metasploit Wrap Up 10/09/2025
rapid7.com·1d
🛡️eBPF Security
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·2d
🔍eBPF
Three ways formally verified code can go wrong in practice
buttondown.com·6h
📜Proof Carrying Code
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·1d
🔲Cellular Automata
How to find Ivanti Endpoint Manager installations on your network
runzero.com·3h
🔓Hacking
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·1h·
Discuss: Hacker News
🦀Rust Macros
Evolution of Apple Security Bounty Program
mjtsai.com·2h
🛡️RISC-V Security
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·1d
🔐Capability Systems