Cactus Language • Semantics 3
inquiryintoinquiry.com·8h
🔢Denotational Semantics
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Activation Alchemist: Sculpting Stability with Functional Signatures
dev.to·3h·
Discuss: DEV
🔍Concolic Testing
Defeating Return Type Polymorphism
philipphagenlocher.de·2d·
Discuss: Hacker News
🧬Functional Programming
Bidirectional type checking step by step (in Ruby)
luizpvas.github.io·50m·
Discuss: Hacker News
Bidirectional Typing
The Day I Hacked XCTrack
blog.syrac.org·8h·
Discuss: Hacker News
🔐PKI Archaeology
APRS over LoRa with RNode | unsigned.io
unsigned.io·12h
📻Homebrew Protocols
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.ai·10h·
Discuss: Hacker News
🎯Performance Proofs
GaloisInc/parameterized-utils
github.com·2d
🧮Algebraic Datatypes
“Payroll Pirate” phishing scam that takes over Workday accounts steals paychecks
arstechnica.com·5h·
Discuss: r/technews
🎯NTLM Attacks
GHC Developer Blog: GHC 9.14.1-alpha3 is now available
haskell.org·1d
🔗Functional Compilers
When Will Quantum Computing Work?
tommccarthy.net·8h·
Discuss: Hacker News
🔐Quantum Security
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·9h·
Discuss: Hacker News
🌐Protocol Synthesis
Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.com·4d·
Discuss: Hacker News
📐Mathematical Art
Three Solutions to Nondeterminism in AI
blog.hellas.ai·2d·
Discuss: Hacker News
🎯Performance Proofs
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·5h·
Discuss: Hacker News
🛡️RISC-V Security
Slip – A Lisp System in JavaScript
lisperator.net·9h·
Discuss: Hacker News
🔗Lisp