Python Program Obfuscation Tool
pixelstech.netΒ·1d
πŸ’£Compression Security
Flag this post
Cryptographic Algorithms Identification in Java Bytecode
binarly.ioΒ·4d
πŸ“Code Metrics
Flag this post
Thompson’s Reflections on Trusting Trust revisited
irreal.orgΒ·16h
πŸ”“Hacking
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.comΒ·13h
🎯NTLM Attacks
Flag this post
Why zero is the most important number in all of mathematics
newscientist.comΒ·18h
πŸ“šArchive Mathematics
Flag this post
Acting in Self-Defense
cacm.acm.orgΒ·17h
🎯Threat Hunting
Flag this post
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
dev.toΒ·2hΒ·
Discuss: DEV
πŸ›‘Cybersecurity
Flag this post
JS/TS Functions Orchestrator
github.comΒ·20hΒ·
Discuss: Hacker News
πŸ”—Concatenative Programming
Flag this post
How to Use Zorn's Lemma
gowers.wordpress.comΒ·1dΒ·
Discuss: Hacker News
βš”οΈLean Theorem
Flag this post
What does computer literacy mean for 2026?
sjg.ioΒ·18hΒ·
Discuss: Hacker News
🧠Personal Knowledge Base
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.ioΒ·8hΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Flag this post
GCAO: Group-driven Clustering via Gravitational Attraction and Optimization
arxiv.orgΒ·4h
🌊Spectral Clustering
Flag this post
Automated Anomaly Detection & Correction in High-Energy Collider Event Reconstruction
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”Vector Forensics
Flag this post
Clojure Runs ONNX AI Models Now - Join the AI fun!
dragan.rocksΒ·1dΒ·
Discuss: Hacker News
🌳Context free grammars
Flag this post
Weekly Challenge: The one about arrays
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“ŠAPL Heritage
Flag this post
Challenge: An asymmetric key system that does everything
news.ycombinator.comΒ·21hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
Show HN: Base64 Decode – A fast, privacy-first Base64 decoder in the browser
base64decode.siteΒ·4dΒ·
πŸ“Text Compression
Flag this post
Length-extension attacks are still a thing
00f.netΒ·4dΒ·
βœ…Checksum Validation
Flag this post
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
arxiv.orgΒ·4h
🌊Stream Ciphers
Flag this post
Verifiable Delay Functions: A brief and gentle introduction
medium.comΒ·4dΒ·
Discuss: Hacker News
🌊Stream Ciphers
Flag this post