Inboxfuscation: Because Rules Are Meant to Be Broken
permiso.ioยท6hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Cracking Forensics CTFs 1.0 โ€” picoCTF
infosecwriteups.comยท1d
๐Ÿ”Binary Forensics
Outbox Done Right in Go: Building Resilient Event-Driven Systems with NATS and SQL
dev.toยท8hยท
Discuss: DEV
๐Ÿ“Database WAL
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.orgยท1dยท
Discuss: Lobsters
๐ŸŒŠStream Ciphers
What is Data Exfiltration and How to Prevent It
securityscorecard.comยท1d
๐Ÿ•ณ๏ธInformation Leakage
Show HN: KittyLoader โ€“ a modern shellcode loader displaying top-tier evasion
github.comยท11hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
How to Gzip a Directory Using Linux Command Line
linuxblog.ioยท2d
๐Ÿ“ฆDeflate
DCP-o-matic โ€ข Re: DCP with CPLs with different audio tracks, Verify gives an error.
dcpomatic.comยท19h
โœ…FLAC Verification
Exagen's Momentum Meets Execution Risks: Why I Choose To HOLD For Now
seekingalpha.comยท16h
๐Ÿ”—Data Provenance
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups
securityaffairs.comยท9h
๐ŸŽซKerberos Exploitation
Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation
klarasystems.comยท3d
๐Ÿ’ฟZFS Internals
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comยท1d
๐Ÿ”“Hacking
My first CVE
natkr.comยท1dยท
๐Ÿ”“Hacking
Check if Your Password Has Been Compromised
cubiclenate.comยท13h
๐Ÿ”“Password Cracking
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
UTF-8 as told by Rob Pike
doc.cat-v.orgยท19hยท
Discuss: Hacker News
๐Ÿ”คCharacter Encoding
A Practical Guide to Online Privacy
blog.clear-byte.comยท14hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comยท1d
๐ŸŽซKerberos Exploitation
Joy & Curiosity #54
registerspill.thorstenball.comยท11m
โš™๏ธProof Engineering