Show HN: rstructor, Pydantic+instructor for Rust
github.comยท1hยท
Discuss: Hacker News
๐Ÿ”’Linear Types
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
Advanced 3D IC Heterogeneous Integration Analysis via Bayesian Optimization and AI-Driven Defect Mapping
dev.toยท2hยท
Discuss: DEV
๐Ÿ”งHardware Verification
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
LibreSSL 4.1.2 and 4.2.1 released with reliability and portability fixes
discoverbsd.comยท11h
๐Ÿ”ŒOperating system internals
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
Request for Quote for Data Recovery from a 512GB SSD
dolphindatalab.comยท16h
๐Ÿ’พFloppy Imaging
Flag this post
Building Up And Sanding Down
endler.devยท20h
๐Ÿ”ฉSystems Programming
Flag this post
IFS Fractal codec
codecs.multimedia.cxยท8h
๐ŸŒ€Fractal Compression
Flag this post
Java Generics and Collections โ€ข Maurice Naftalin & Stuart Marks โ€ข GOTO 2025
youtube.comยท1d
ฮปLambda Formalization
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioยท5h
๐Ÿ“ŸTerminal Forensics
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท1h
๐Ÿ”“Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท21h
๐ŸŒDNS over QUIC
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท3h
๐Ÿ”“Hacking
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.comยท4h
๐Ÿ“„Document Digitization
Flag this post
State of the Source at ATO 2025: Licensing 201
opensource.orgยท4h
๐Ÿ”“Open Source Software
Flag this post