Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·2d·
Discuss: Hacker News
🔓Reverse engineering
The Death of the Curious Developer
hackernoon.com·13h
🧭Content Discovery
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·19h
🌊Streaming Systems
Open Lineage
usenix.org·15h
🔌Interface Evolution
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com·3d
🔓Decompilation
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Pacsea Is a New TUI That Makes Arch Package Browsing Easier
linuxiac.com·3h
🔗Topological Sorting
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·15h
🔗Graph Isomorphism
Ship Broken Things
matmul.net·23h·
Discuss: Hacker News
🔗Topological Sorting
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·5h·
Discuss: Hacker News
🌐Protocol Synthesis
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·8h
🚨Incident Response
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology
Metasploit Wrap Up 10/09/2025
rapid7.com·23h
🛡️eBPF Security
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2d
📺VT100
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.com·59m
🏺Kerberos Archaeology
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·6h·
Discuss: Hacker News
📼Cassette Archaeology
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·4h
🔓Hacking