Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Hacking Workshop for October 2025
rhaas.blogspot.com·5d·
🧬PostgreSQL Forensics
A Kevin week
blog.mitrichev.ch·3d·
📐Linear Algebra
Show HN: Root Managed Services
rootmanagedservices.com·5d·
Discuss: Hacker News
🔌Operating system internals
Network Switch Reverse Engineering
fohdeesha.com·6d·
Discuss: Hacker News
🎮Switch Archaeology
How This Israeli Hacker Bootstrapped Her AI Cyber Company To Profitability
forbes.com·2d·
Discuss: Hacker News
🚀Indie Hacking
Charlie Kirk Assassination Sparks Social Media Crackdown
kenklippenstein.com·1d·
Discuss: Hacker News
📡RSS
Airlines Rely on the Cloud
cacm.acm.org·2d
🌊Streaming Systems
Is ADHD just a problem with your work environment?
medium.com·1d·
Discuss: Hacker News
🎯Threat Hunting
The Road To JVM: How To Create A Brainfuck Interpreter
blog.codeminer42.com·6d
🔗Concatenative Programming
Algebraic Types are not Scary
blog.aiono.dev·2d·
🧮Algebraic Datatypes
Pulumi Previews AI Agents Trained to Automate Infrastructure Management
devops.com·1d
🤖Network Automation
Robinsons Retail Holdings, Inc. (RRETY) Shareholder/Analyst Call Transcript
seekingalpha.com·1d
🔐Certificate Analysis
Three tiny Go web-server experiments: exposing, executing, and extending
reddit.com·6d·
Discuss: r/golang
🌐WASI
Building a Legal Document Intelligence Platform with BigQuery AI: 99% Efficiency Implementation Guide
dev.to·1d·
Discuss: DEV
🤖Archive Automation
Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links
zimperium.com·5d
📱QR Archaeology
Claude Code vs Codex: Dev Workflow Comparison
dev.to·2d·
Discuss: DEV
🦀Rust Macros
San Jose: Three dead, suspect at large after home shooting
mercurynews.com·1d
🚨Incident Response
Predictive Dynamic Stability Assessment via Multi-Modal Neural Resonance
dev.to·2d·
Discuss: DEV
📊Quantization
The Horton-Strahler number of butterfly trees
arxiv.org·1d
🧮Kolmogorov Bounds
LAVa: Layer-wise KV Cache Eviction with Dynamic Budget Allocation
arxiv.org·2d
💻Local LLMs