Python Certifi and Custom CAs
zufallsheld.deยท14hยท
Discuss: Hacker News
๐ŸงชCBOR Fuzzing
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.comยท1dยท
Discuss: r/golang
๐ŸŽซKerberos History
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.comยท1d
โณTime Capsule Networks
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.comยท8hยท
๐Ÿ‘‘RISC-V Privilege
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.comยท2dยท
๐ŸŒWebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Ÿ”Archive Encryption
Flag this post
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan
dev.toยท1hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
eBPF Rootkit
synacktiv.comยท13hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movยท10hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.proยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Programs
Flag this post
Langโ€™s theorem โ€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comยท10h
ฮปLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ŸŽฏNTLM Attacks
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Ÿ”“Hacking
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.ioยท1d
๐Ÿ’งLiquid Types
Flag this post
Kyber vs. RSA-2048
blog.ellipticc.comยท2dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท17h
๐ŸŽซKerberos Attacks
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comยท1d
๐Ÿ Homelab Security
Flag this post
RuBee
computer.ripยท8h
๐Ÿ“ปHomebrew Protocols
Flag this post