Bidirectional type checking step by step (in Ruby)
luizpvas.github.ioยท44mยท
Discuss: Hacker News
โฌŒBidirectional Typing
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
7-Zip: Information on closed security gaps available
heise.deยท12h
๐Ÿ’ฃZIP Vulnerabilities
Using Pydantic for ETL - Clean, Validate, and Transform Data with Confidence
dev.toยท16hยท
Discuss: DEV
โœ…Format Validation
Linux SBCs for development + RE
zetier.comยท1d
๐ŸŽฏEmulator Accuracy
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.orgยท8h
๐Ÿ”“Hacking
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท4d
๐Ÿ”Cryptographic Archaeology
A new breed of analyzers
daniel.haxx.seยท11hยท
๐Ÿ›Fuzzing
The Day I Hacked XCTrack
blog.syrac.orgยท8hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.comยท1d
๐Ÿ”„Content Deduplication
From Clicks to Code: Building a Productionโ€‘Ready EVM Transaction Client (Approve, Mint, Swap, EIPโ€‘1559)
dev.toยท1dยท
Discuss: DEV
โœ…Format Verification
InfoSec News Nuggets 10/10/2025
aboutdfir.comยท7h
๐Ÿ”“Hacking
Implementing ZADD If Key Exists
rozumem.xyzยท17hยท
Discuss: Hacker News
โšกRedis Internals
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.orgยท19h
๐Ÿ•ต๏ธVector Smuggling
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.comยท2d
๐Ÿ”BitFunnel
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
Running new applications on old glibc
lightofdawn.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Static Linking
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
darkreading.comยท4h
๐Ÿ”“Hacking
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท2d
๐Ÿ“บVT100