Arranging the PIC Parterre
rastamouse.meยท14h
๐Ÿ”—Static Linking
Flag this post
Modern Perfect Hashing
blog.sesse.netยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Indexing Coffee with Notion
xvw.lolยท9hยท
โ˜•Coffee Science
Flag this post
Hacking India's largest automaker: Tata Motors
eaton-works.comยท1hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
github.comยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท10h
๐Ÿš€Indie Hacking
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comยท2d
๐Ÿ“ŸCLI Design
Flag this post
Police used Flock cameras to accuse a Denver woman of package theft
denverite.comยท5hยท
Discuss: Hacker News
๐ŸšจIncident Response
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.comยท1d
๐Ÿ›ก๏ธeBPF Security
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท23h
๐Ÿ”“Password Cracking
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
What does computer literacy mean for 2026?
sjg.ioยท1dยท
Discuss: Hacker News
๐Ÿง Personal Knowledge Base
Flag this post
How Open Source License Scanners Work
fossa.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Flag this post
What Is FedCM?
fusionauth.ioยท5hยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Flag this post
Show HN: On-chain file authenticity via Solana NFT
deepfakesafety.comยท9hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Learning osquery
blog.devops.devยท1d
๐Ÿ”ŒOperating system internals
Flag this post
The seven second kernel compile
es.tldp.orgยท1dยท
Discuss: Hacker News
๐Ÿ’พMemory Mapping
Flag this post
Memento Labs, the ghost of Hacking Team, has returned โ€” or maybe it was never gone at all.
securityaffairs.comยท1d
๐Ÿ”“Hacking
Flag this post
Automated Validation of Distributed Systems Through Hyper-Scoring and Continuous Code Synthesis
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Concolic Testing
Flag this post
The tricky science of Internet measurement
blog.cloudflare.comยท1dยท
Discuss: Hacker News
๐Ÿ“กNetwork Archaeology
Flag this post