Python Certifi and Custom CAs
๐งชCBOR Fuzzing
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
๐ซKerberos History
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.comยท1d
โณTime Capsule Networks
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
๐WebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Archive Encryption
Flag this post
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan
๐ฏThreat Hunting
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐ฃZIP Vulnerabilities
Flag this post
eBPF Rootkit
๐ก๏ธeBPF Security
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Cryptographic Archaeology
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
๐Operating system internals
Flag this post
Langโs theorem โ Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comยท10h
ฮปLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ฏNTLM Attacks
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Hacking
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.ioยท1d
๐งLiquid Types
Flag this post
Kyber vs. RSA-2048
๐Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท17h
๐ซKerberos Attacks
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comยท1d
๐ Homelab Security
Flag this post
RuBee
computer.ripยท8h
๐ปHomebrew Protocols
Flag this post
Loading...Loading more...