Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
🧅Tor Networks
Flag this post
Static web hosting performance on Intel N150 compared across BSDs and Linux
discoverbsd.com·2d
🔌Operating system internals
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
Recipe 8.6. Picking a Random Line from a File (Perl Cookbook)
csg.sph.umich.edu·14h
📝Text Compression
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
🌐WebRTC Archives
Flag this post
RuBee
computer.rip·9h
📻Homebrew Protocols
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
Markdown Is Holding You Back
📋Document Grammar
Flag this post
[Showcase] WulfVault – self-hosted secure file sharing with audit logs, large file support and custom branding
🗄️File Systems
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org·2d
🏺Format Archaeology
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
LimeDB: Architectural Shift to a Go-based Distributed Key-Value Store with Consistent Hashing
🔌Interface Evolution
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
🧪CBOR Fuzzing
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·1d
🔤EBCDIC Privacy
Flag this post
Revisiting Manager READMEs
🦋Format Metamorphosis
Flag this post
Loading...Loading more...