Rowhammer: TRR on DDR5 DRAM has been broken
comsec.ethz.ch·1d·
🔍RISC-V Forensics
Predictive Precision: Combining Data and Reasoning for Self-Healing Systems by Arvind Sundararajan
dev.to·5h·
Discuss: DEV
💾Persistence Strategies
Sprites mods - Hard disk hacking - Intro
web.archive.org·1d
🎮Cartridge Archaeology
Dr Áine MacDermott, Senior Lecturer In Cyber Security And Digital Forensics, Liverpool John Moores University
forensicfocus.com·4h
🔍Audio Forensics
Under the Pure Curtain: From RAT to Builder to Coder
research.checkpoint.com·5h
🔓Hacking
Very necessary update to a liquid cooled SilverStone RM61-312 Epyc 9654 on ASRockRack GENOAD8X-2T/BCM
reddit.com·1h·
Discuss: r/homelab
🧲RISC-V Archaeology
Semantic Dictionary Encoding
falvotech.com·1d·
Discuss: Hacker News
🌀Brotli Dictionary
Translating the STATUS_STACK_BUFFER_OVERRUN status code into customer-ready text
devblogs.microsoft.com·4h
🧪Binary Fuzzing
Your Unit Tests Suck
medium.com·1h·
Discuss: Hacker News
🧪Property-Based Testing
Fuzzy Logic: Cleaning Floppy Disk with our Conservation Department — Part One
digitalpreservation-blog.lib.cam.ac.uk·7h
💾Floppy Imaging
Ask HN: How can I test FTS5 engine in SQLite3?
news.ycombinator.com·8h·
Discuss: Hacker News
🗄️SQLite Internals
VulAgent: Hypothesis-Validation based Multi-Agent Vulnerability Detection
arxiv.org·14h
Proof Automation
Haiku Activity & Contract Report, August 2025
haiku-os.org·17h
🔄Sync Engine
1130 MRAM board - failed chips identified and replaced
rescue1130.blogspot.com·1d·
Circuit Archaeology
Discord as a C2 and the cached evidence left behind
pentestpartners.com·8h
📟Terminal Forensics
Which cores does Visual Look Up use?
eclecticlight.co·11h
🖥️Terminal Renaissance
The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.com·20h
Proof Automation
How Space Debris Cleanup Could Become the Next Trillion-Dollar Industry
hackernoon.com·8h
📼Cassette Hacking