Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·4h
🎫Kerberos Exploitation
Flag this post
A new patch could help to heal the heart
news.mit.edu·25m·
Discuss: Hacker News
⚙️Cassette Mechanics
Flag this post
Coercin, Monopsony in American Manufacturing: Evidence from Alabama Prison Labor
papers.ssrn.com·3h·
Discuss: Hacker News
📼Tape Algebra
Flag this post
Experiences with AI-Generated Pornography
link.springer.com·18h·
Discuss: Hacker News
🤖AI Curation
Flag this post
Using Street Lamps as EV Chargers – Tech Briefs
techbriefs.com·1d·
Discuss: Hacker News
💿WORM Storage
Flag this post
Ukraine First To Demo Open Source Security Platform To Help Secure Power Grid
hardware.slashdot.org·1d
🔓Hacking
Flag this post
Porting Lean to the ESP32-C3 RISC-V Microcontroller
kuruczgy.com·17h·
🔩Systems Programming
Flag this post
Why stop at 1M tokens when you can have 10M?
news.ycombinator.com·1d·
Discuss: Hacker News
Homebrew CPUs
Flag this post
AI-based malware makes attacks stealthier and more adaptive
cybersecuritydive.com·2h
🕵️Vector Smuggling
Flag this post
Atomically accurate de novo design of antibodies with RFdiffusion
nature.com·1h
🧬Copy Number Variants
Flag this post
Field notes from making a living without writing a line of code
ag404labs.com·10h·
Discuss: Hacker News
🚀Indie Hacking
Flag this post
Auditable-choice reframing unlocks RL-based verification for open-ended tasks
arxiv.org·13h
📏Linear Logic
Flag this post
Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security
tenable.com·1d
🏠Homelab Security
Flag this post
Identifying Linux Kernel Instability Due to Poor RCU Synchronization
arxiv.org·1d
🔍eBPF
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·3d
💣ZIP Vulnerabilities
Flag this post
Enhancing Solar Cell Efficiency Through Stochastic Grain Boundary Passivation Optimization
dev.to·3d·
Discuss: DEV
⚙️Tape Engineering
Flag this post
From product to system network challenges in system of systems lifecycle management
arxiv.org·2d
🦋Format Metamorphosis
Flag this post
Part 5: Building Station Station - Should You Use Spec-Driven Development?
dev.to·1d·
Discuss: DEV
🏠Homelab Pentesting
Flag this post
Part 5: Building Station Station - Should You Use Spec-Driven Development?
dev.to·1d·
Discuss: DEV
🏠Homelab Pentesting
Flag this post
DPO-F+: Aligning Code Repair Feedback with Developers' Preferences
arxiv.org·1d
🔄Reproducible Builds
Flag this post