Beyond good olโ€™ Run key, Part 153
hexacorn.comยท3d
๐Ÿ”NTLM Archaeology
Flag this post
Windows Insider Previews Improve Search and Bring Memory Checks
heise.deยท16h
๐Ÿ”ŒOperating system internals
Flag this post
Overhaul of my dotfiles
markjgsmith.comยท16h
๐Ÿฆ‹Format Metamorphosis
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comยท1d
๐Ÿ“ŸCLI Design
Flag this post
Modern Perfect Hashing
blog.sesse.netยท18hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Dubious security vulnerability: Denial of service by loading a very large file
devblogs.microsoft.comยท17h
๐Ÿ’ฃCompression Security
Flag this post
Analyzing Ransomware
windowsir.blogspot.comยท13hยท
๐Ÿฆ Malware Analysis
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
github.comยท13hยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Flag this post
Let's Help NetBSD Cross the Finish Line Before 2025 Ends
discoverbsd.comยท21h
๐Ÿ”ŒOperating system internals
Flag this post
Re: A few comments on โ€˜ageโ€™ (2019)
groups.google.comยท12hยท
Discuss: Lobsters
๐Ÿ”Archive Encryption
Flag this post
Making the Internet observable: the evolution of Cloudflare Radar
blog.cloudflare.comยท19hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธMesh Networking
Flag this post
What does computer literacy mean for 2026?
sjg.ioยท17hยท
Discuss: Hacker News
๐Ÿง Personal Knowledge Base
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.comยท12hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
How Open Source License Scanners Work
fossa.comยท10hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Flag this post
Comprehensive Review of the Palm Vein Unlocking Technology
eufy.comยท4hยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
Flag this post
Windows will soon prompt for memory scans after BSOD crashes
bleepingcomputer.comยท12hยท
Discuss: Hacker News
๐Ÿ’พPersistent Memory
Flag this post
Release Highlights: VMRay Platform 2025.4.0
vmray.comยท3d
๐ŸบZIP Archaeology
Flag this post
The seven second kernel compile
es.tldp.orgยท11hยท
Discuss: Hacker News
๐Ÿ’พMemory Mapping
Flag this post
CodeAD: Synthesize Code of Rules for Log-based Anomaly Detection with LLMs
arxiv.orgยท3h
๐Ÿ‘๏ธObservatory Systems
Flag this post
Learning osquery
blog.devops.devยท18h
๐Ÿ”ŒOperating system internals
Flag this post