Modern Perfect Hashing
blog.sesse.net·7h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·16h
🌐NetworkProtocols
Flag this post
How blocks are chained in a blockchain
johndcook.com·4h·
Discuss: Hacker News
🔗Hash Chains
Flag this post
Paillier Cryptosystem
en.wikipedia.org·7h·
Discuss: Hacker News
🔐Homomorphic Encryption
Flag this post
Python Program Obfuscation Tool
pixelstech.net·16h
💣Compression Security
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
github.com·3h·
Discuss: Hacker News
🏠Homelab Pentesting
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.com·2h·
Discuss: Hacker News
🔗Hash Chains
Flag this post
SHA-256 File Hasher & Duplicate Finder in Python
dev.to·2d·
Discuss: DEV
🔐Hash Functions
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.com·1h
🛡️eBPF Security
Flag this post
Learning osquery
blog.devops.dev·7h
🔌Operating system internals
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.com·2h
🎯NTLM Attacks
Flag this post
Checklist: Securely Using a Python Program
nocomplexity.com·6h
🛡️CLI Security
Flag this post
[REVIVE-SA-2025-002] Revive Adserver Vulnerability
seclists.org·1d
🎫Kerberos Exploitation
Flag this post
10-26-building-the-rope-operation-for-tensorrent-hardware at Clehaxze
clehaxze.tw·11h
SIMD Vectorization
Flag this post
The art and science of effective security storytelling
redcanary.com·7h
🔗Data Provenance
Flag this post
OpenBSD Errata: October 26, 2025 (syspatch)
bsdsec.net·2h
🐡OpenBSD
Flag this post
Thompson’s Reflections on Trusting Trust revisited
irreal.org·5h
🔓Hacking
Flag this post
The Quantum Schur Transform: Theory and Implementations
blog.wolfram.com·5h
⚛️Quantum Compression
Flag this post
How to Install Vaultwarden Password Manager on Ubuntu 24.04
rosehosting.com·3h
🛠System administration
Flag this post
Cryptographic Algorithms Identification in Java Bytecode
binarly.io·4d
📏Code Metrics
Flag this post