Inboxfuscation: Because Rules Are Meant to Be Broken
permiso.ioยท3hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Cracking Forensics CTFs 1.0 โ€” picoCTF
infosecwriteups.comยท1d
๐Ÿ”Binary Forensics
Outbox Done Right in Go: Building Resilient Event-Driven Systems with NATS and SQL
dev.toยท5hยท
Discuss: DEV
๐Ÿ“Database WAL
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.orgยท1dยท
Discuss: Lobsters
๐ŸŒŠStream Ciphers
What is Data Exfiltration and How to Prevent It
securityscorecard.comยท1d
๐Ÿ•ณ๏ธInformation Leakage
Show HN: KittyLoader โ€“ a modern shellcode loader displaying top-tier evasion
github.comยท8hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
How to Gzip a Directory Using Linux Command Line
linuxblog.ioยท2d
๐Ÿ“ฆDeflate
DCP-o-matic โ€ข Re: DCP with CPLs with different audio tracks, Verify gives an error.
dcpomatic.comยท16h
โœ…FLAC Verification
Exagen's Momentum Meets Execution Risks: Why I Choose To HOLD For Now
seekingalpha.comยท13h
๐Ÿ”—Data Provenance
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups
securityaffairs.comยท6h
๐ŸŽซKerberos Exploitation
Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation
klarasystems.comยท3d
๐Ÿ’ฟZFS Internals
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comยท1d
๐Ÿ”“Hacking
My first CVE
natkr.comยท1dยท
๐Ÿ”“Hacking
Check if Your Password Has Been Compromised
cubiclenate.comยท11h
๐Ÿ”“Password Cracking
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
UTF-8 as told by Rob Pike
doc.cat-v.orgยท17hยท
Discuss: Hacker News
๐Ÿ”คCharacter Encoding
A Practical Guide to Online Privacy
blog.clear-byte.comยท12hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comยท1d
๐ŸŽซKerberos Exploitation
ELA-1515-1 imagemagick security update
freexian.comยท7h
๐Ÿ’ฃZIP Vulnerabilities