Encrypted Root and ZFS on NixOS
ryanseipp.comยท10h
๐Ÿ”’Secure Boot
Claude Code
michal.sapka.plยท35m
๐Ÿฆ€Rust Macros
This widely used Remote Monitoring tool is being used to deploy AsyncRAT to steal passwords
techradar.comยท2d
๐Ÿ”“Hacking
tmux-plugins/tmux-resurrect
github.comยท2d
๐Ÿ•ต๏ธFormat Recovery
Network Switch Reverse Engineering
fohdeesha.comยท1dยท
Discuss: Hacker News
๐ŸŽฎSwitch Archaeology
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Six Years of Admiral Shark's Keyboards
sharktastica.co.ukยท20hยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
Beyond the surface - Exploring attacker persistence strategies in Kubernetes
raesene.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
LLM-Generated Rules Engines for LLM Explainability
brain.coยท1dยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Lobsters Interview with Susam
lobste.rsยท1dยท
Discuss: Lobsters
๐Ÿ”—Concatenative Programming
And by "garbage" I mean it. Linus
lore.kernel.orgยท2hยท
Discuss: Hacker News
๐ŸงชHardware Fuzzing
Show HN: VibeDbg โ€“ Cconversational, LLM-Powered AI Assistant for WinDbg
github.comยท19hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Anchored Persona Reinforcement (APR)
zenodo.orgยท5hยท
Discuss: Hacker News
๐Ÿ“ABNF Extensions
Nmap: The Detective Behind Your Networkโ€™s Secrets
infosecwriteups.comยท10h
๐Ÿ”NTLM Forensics
kioptrix level 1
infosecwriteups.comยท1d
๐Ÿ”eBPF
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
Architecting Precision: Breakthrough Frameworks Redefine Systems and Data Integration
hackernoon.comยท2d
๐Ÿ”งKAITAI
All You Need Is MCP โ€“ LLMs Solving a DEF Con CTF Finals Challenge
wilgibbs.comยท2dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Migrating to TanStack Start
catalins.techยท8hยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
Exploiting Authorisation Sprawl Is the New Black
news.risky.bizยท2d
๐Ÿ”“Hacking