Arranging the PIC Parterre
rastamouse.meยท14h
๐Static Linking
Flag this post
Modern Perfect Hashing
๐งชBinary Fuzzing
Flag this post
Indexing Coffee with Notion
โCoffee Science
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
๐ Homelab Pentesting
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท10h
๐Indie Hacking
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comยท2d
๐CLI Design
Flag this post
Police used Flock cameras to accuse a Denver woman of package theft
๐จIncident Response
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.comยท1d
๐ก๏ธeBPF Security
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท23h
๐Password Cracking
Flag this post
What Is FedCM?
๐ฏNTLM Attacks
Flag this post
Learning osquery
blog.devops.devยท1d
๐Operating system internals
Flag this post
The seven second kernel compile
๐พMemory Mapping
Flag this post
Memento Labs, the ghost of Hacking Team, has returned โ or maybe it was never gone at all.
securityaffairs.comยท1d
๐Hacking
Flag this post
Automated Validation of Distributed Systems Through Hyper-Scoring and Continuous Code Synthesis
๐Concolic Testing
Flag this post
Loading...Loading more...