Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
๐ง
Tor Networks
Flag this post
Python Certifi and Custom CAs
๐งชCBOR Fuzzing
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.comยท1d
โณTime Capsule Networks
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
๐WebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Archive Encryption
Flag this post
eBPF Rootkit
๐ก๏ธeBPF Security
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐ฃZIP Vulnerabilities
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Cryptographic Archaeology
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
๐ซKerberos History
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
๐Operating system internals
Flag this post
Lockzo AL501 3-in-1 smart door lock review with the Tuya mobile app
cnx-software.comยท1h
๐ Home Automation
Flag this post
Langโs theorem โ Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comยท11h
ฮปLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ฏNTLM Attacks
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Hacking
Flag this post
Kyber vs. RSA-2048
๐Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท18h
๐ซKerberos Attacks
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.ioยท1d
๐งLiquid Types
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comยท1d
๐ Homelab Security
Flag this post
Loading...Loading more...