Python Program Obfuscation Tool
pixelstech.net·1d
📝Text Compression
Flag this post
Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Dubious security vulnerability: Denial of service by loading a very large file
devblogs.microsoft.com·20h
💣ZIP Vulnerabilities
Flag this post
Re: A few comments on ‘age’ (2019)
🔐Archive Encryption
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·1d
🌐NetworkProtocols
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·23h
🎯NTLM Attacks
Flag this post
A Few Comments on 'Age'
🔐Archive Encryption
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.io·6h
🔓Password Cracking
Flag this post
Memento Labs, the ghost of Hacking Team, has returned — or maybe it was never gone at all.
securityaffairs.com·13h
🔓Hacking
Flag this post
The Reel Deal: Why Audiovisual Heritage Matters
dpconline.org·13h
🏺Media Archaeology
Flag this post
Making a Virtual Machine Look like Real Hardware to Malware
hackaday.com·8h
🕸️WebAssembly
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.com·14h
🛡️eBPF Security
Flag this post
Embedding Leak Auditor
🕵️Vector Smuggling
Flag this post
Valuable News – 2025/10/27
vermaden.wordpress.com·23h
🔌Operating system internals
Flag this post
Turbosqueeze Realtime Multi-Threaded Compression Aims To Compete With Zstd, Snappy
phoronix.com·23h
⚡Modern Compression
Flag this post
A Government Data Center
thedailywtf.com·1d
🛡️Preservation Proofs
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.be·2h
🔐Cryptographic Archaeology
Flag this post
Loading...Loading more...