What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.euยท4d
๐Ÿ”NTLM Forensics
Linkdump No 75
82mhz.netยท3d
๐Ÿ Personal Archives
Why I Choose Email over Messaging
spinellis.grยท1dยท
Discuss: Hacker News
โšกgRPC
Hackers exploited Zimbra flaw as zero-day using iCalendar files
bleepingcomputer.comยท20hยท
๐Ÿ”“Hacking
Hacking Claude Code for Fun and Profit
sibylline.devยท1dยท
๐Ÿค–Network Automation
Show HN: Soravideodownloader.com โ€“ A tool to save Sora videos and prompts
soravideodownloader.comยท10hยท
Discuss: Hacker News
๐Ÿ“ฆMKV Containers
just build things
dev.toยท5hยท
Discuss: DEV
๐Ÿ›Digital humanities
Decoding the Heart's Whisper: AI-Powered Early Disease Detection
dev.toยท18hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Docker at AI Engineer Paris: Build and Secure AI Agents with Docker
docker.comยท1h
๐Ÿ Homelab Orchestration
HAVIR: HierArchical Vision to Image Reconstruction using CLIP-Guided Versatile Diffusion
arxiv.orgยท10h
๐Ÿค–Advanced OCR
AI Code Assistants Are Copying GPL Code Into Your Product (And You'll Get Sued)
dev.toยท1dยท
Discuss: DEV
๐Ÿš€Indie Hacking
Building My Smart 2nd Brain, Part 3: API and UI Explained
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Archival Workflows
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.comยท2d
๐Ÿ“ŸTerminal Forensics
##"AI in 2025: The Year of Smarter, Safer, and More Human AI"
dev.toยท8hยท
Discuss: DEV
๐ŸŒCultural Algorithms
Automated Risk Calibration for Shipping Asset-Backed Securities via Dynamic Portfolio Optimization
dev.toยท20hยท
Discuss: DEV
โš™๏ธBatch Processing
iPad Pro M5: What hasn't been leaked yet
heise.deยท1h
๐ŸŽApple II Heritage
Towards fairer public transit: Real-time tensor-based multimodal fare evasion and fraud detection
arxiv.orgยท3d
๐Ÿ“ŠSpectrograms
Geometric Structures and Patterns of Meaning: A PHATE Manifold Analysis of Chinese Character Embeddings
arxiv.orgยท3d
๐Ÿ“Geometric Hashing