GNU libmicrohttpd2 Audit Complete!
ostif.org·7h
🧪Binary Fuzzing
dgsh – Directed Graph Shell
www2.dmst.aueb.gr·11h·
Discuss: Hacker News
📝Shell Parsing
PIPER Robotic Arm - Fixed Position Recording & Replay
hackster.io·18h
🤖Tape Automation
Why your Mac is next: how amateur data stealers became a business
jamf.com·7h
📟Terminal Forensics
The End of Config Hell in Python, Thanks to Pydantic v2
hackernoon.com·1d
Format Verification
Proper services
anarc.at·10h
📊Homelab Monitoring
Empowering defenders in the era of agentic AI with Microsoft Sentinel
microsoft.com·12h
🎫Kerberos History
NCC Group
nccgroup.com·1d
🧪Hardware Fuzzing
OpenTofu Introduces Ephemeral Support for Safer Secrets Management
linuxiac.com·1d
🛡️Preservation Proofs
LLM security agent finds vulnerability in LLM engineering platform
depthfirst.com·3h·
Discuss: Hacker News
🔓Hacking
Taming your shell for LLMs
ricardoanderegg.com·5d·
Discuss: Hacker News
Shell Verification
Namespaces: A Step-By-Step Guide to Kubernetes Isolation
thenewstack.io·1d
📦Container Security
Defending LLM applications against Unicode character smuggling
aws.amazon.com·8h
🔤Character Encoding
Brains — TryHackMe Walkthrough
infosecwriteups.com·2d
📟Terminal Forensics
Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain
socket.dev·11h·
Discuss: Hacker News
📦Package Managers
We built our coding agent for Slack instead of the terminal
mintlify.com·1d·
⚙️Proof Engineering
Capture JavaScript Integrity Metadata using CSP!
scotthelme.ghost.io·1d
🧬Bitstream Evolution
Google Common Lisp Style Guide (Revision 1.28)
google.github.io·17h·
Discuss: Hacker News
🔗Lisp
Arch Linux Security with Foxboron and Anthraxx
opensourcesecurity.io·2d
🐚Nordic Shell
Show HN: Using Terraform for *Local* Dev Infra
runharbor.com·6h·
Discuss: Hacker News
🧱Immutable Infrastructure