Cryptographic Algorithms Identification in Java Bytecode
binarly.ioยท2d
๐Code Metrics
Flag this post
BeyondTrust PAM โ Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.eduยท1d
๐Archive Encryption
Flag this post
Show HN: Base64 Decode โ A fast, privacy-first Base64 decoder in the browser
๐Text Compression
Flag this post
Modern perfect hashing
๐งชBinary Fuzzing
Flag this post
Priority Scanning: Get Faster Visibility into Exposures Across your Attack Surface
bitsight.comยท2d
๐ฟOptical Forensics
Flag this post
Even the easiest data requests can require some effort
statmodeling.stat.columbia.eduยท14h
๐Academic Torrents
Flag this post
Weekly Update 475
troyhunt.comยท6h
๐บKerberos Archaeology
Flag this post
We Programmers Need "Results"
๐Proof Carrying Code
Flag this post
HigherOrderCO/Bend2
github.comยท2h
๐Functional Compilers
Flag this post
Cloud Discovery With AzureHound
unit42.paloaltonetworks.comยท1d
๐บKerberos Archaeology
Flag this post
Looking for TEMPer hardware data
โ๏ธDIY Electronics
Flag this post
Go cryptography library
๐Cryptographic Archaeology
Flag this post
Unicode Footguns in Python
๐คUnicode Normalization
Flag this post
ashishps1/awesome-system-design-resources
github.comยท2h
๐กNetwork Protocol Design
Flag this post
Loading...Loading more...