Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Build an Unbreakable EVM Read Stack in Python: Async Web3.py, ABIs, Proxies, and Decimals
dev.toยท4hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท10h
๐Ÿ›๏ธPREMIS Metadata
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท13h
๐Ÿ’ŽInformation Crystallography
The Death of the Curious Developer
hackernoon.comยท18h
๐ŸงญContent Discovery
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.comยท23h
๐ŸŒŠStreaming Systems
Open Lineage
usenix.orgยท19h
๐Ÿ”ŒInterface Evolution
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.comยท3d
๐Ÿ”“Decompilation
A Function Generator From The Past
hackaday.comยท4h
โšกCircuit Archaeology
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
Pacsea Is a New TUI That Makes Arch Package Browsing Easier
linuxiac.comยท8h
๐Ÿ”—Topological Sorting
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท19h
๐Ÿ”—Graph Isomorphism
Ship Broken Things
matmul.netยท1dยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท9hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
The Day I Hacked XCTrack
blog.syrac.orgยท8hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท2h
๐ŸŽซKerberos Attacks
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท2d
๐Ÿ“บVT100
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.comยท5h
๐ŸบKerberos Archaeology