Python Certifi and Custom CAs
🧪CBOR Fuzzing
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
🎫Kerberos History
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.com·1d
⏳Time Capsule Networks
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
🌐WebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·9h
λLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.com·3d
🎯NTLM Attacks
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.io·1d
💧Liquid Types
Flag this post
Securing the Win: What Cybersecurity Can Learn From the Paddock
darkreading.com·2d
💾Persistence Strategies
Flag this post
Kyber vs. RSA-2048
🔐Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·16h
🎫Kerberos Attacks
Flag this post
RuBee
computer.rip·7h
📻Homebrew Protocols
Flag this post
Loading...Loading more...