HTB Vintage Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comΒ·1d
🎯NTLM Attacks
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.comΒ·1d
🎫Kerberos Attacks
Made a project to integrate GPT models into directly Ghidra
github.comΒ·52mΒ·
Discuss: Hacker News
πŸŒ€Brotli Internals
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.chΒ·1dΒ·
πŸ›‘οΈRISC-V Security
Why the best LLMs are not enough for the AI SOC
intezer.comΒ·1d
🎯Threat Hunting
UTF-8 as told by Rob Pike
doc.cat-v.orgΒ·7hΒ·
Discuss: Hacker News
πŸ”€Character Encoding
Homelab Update!
i.redd.itΒ·19hΒ·
Discuss: r/homelab
🏠Homelab
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comΒ·2d
🦠Malware Analysis
The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comΒ·2d
πŸ”Archive Cryptanalysis
NightMARE on 0xelm Street, a guided tour
elastic.coΒ·1d
πŸ§ͺBinary Fuzzing
Windows KASLR Bypass – CVE-2025-53136
crowdfense.comΒ·2dΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Active Directory Security Tip #1: Active Directory Admins
adsecurity.orgΒ·16h
πŸ”’LDAP Security
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.comΒ·17h
πŸ”—Data Provenance
What’s New in the Latest Trisul Release
trisul.orgΒ·1d
🌊Streaming Systems
Building Production-Ready LLM Integrations With MCP Over gRPC - Mehrdad Afshari, Signeen Inc.
youtube.comΒ·15h
⚑gRPC
18 Popular npm Packages Compromised in Attack
thenewstack.ioΒ·3h
πŸ”“Open Source Software
Cariddi: Unleash the Power of Automated Web Reconnaissance!
dev.toΒ·3hΒ·
Discuss: DEV
🌐WARC Mining
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.orgΒ·1d
πŸŒ€Brotli Internals