Creating a "Two-Face" Rust binary on Linux
synacktiv.comยท2h
๐Ÿฆ Parasitic Storage
Flag this post
Gradual Automation with Do Nothing Scripts
alexalejandre.comยท1hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Flag this post
Entering the Growing IPv4 Market: What Enterprises Should Do Now
circleid.comยท2h
๐Ÿ“กBGP Archaeology
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
dev.toยท3dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Flag this post
Modern Perfect Hashing
blog.sesse.netยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comยท1d
๐Ÿ“ŸCLI Design
Flag this post
Renderโ€™s MCP Server Bridges the Gap Between LLMs and Cloud Infrastructure
hackernoon.comยท2h
๐Ÿ‘๏ธObservatory Systems
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
github.comยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.netยท17h
๐Ÿ’พvintage computing
Flag this post
Analyzing Ransomware
windowsir.blogspot.comยท23hยท
๐Ÿฆ Malware Analysis
Flag this post
Microsoft Releases AI Call Center Stack with Voice, SMS, and Memory
github.comยท9hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท1h
๐Ÿš€Indie Hacking
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท13h
๐Ÿ”“Password Cracking
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.comยท21h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Flock Camera
coloradosun.comยท1hยท
Discuss: Hacker News
๐ŸšจIncident Response
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.comยท23hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
How Open Source License Scanners Work
fossa.comยท21hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Flag this post
Show HN: On-chain file authenticity via Solana NFT
deepfakesafety.comยท28mยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
The seven second kernel compile
es.tldp.orgยท21hยท
Discuss: Hacker News
๐Ÿ’พMemory Mapping
Flag this post