Notes to self: Semaphore-UI secrets
jpmens.net·5d
🌊Stream Ciphers
Flag this post
To Affinity and Beyond
⟷Bidirectional Programming
Flag this post
"The Bug Hunt" blog post pattern
🦀Rusty Databases
Flag this post
Punching Holes into Firewalls
🌐DNS over QUIC
Flag this post
FreeBSD shortly before 15.0: Trust is good, reproducibility is better
heise.de·1d
🔓Open Source Software
Flag this post
Recovering Data from the OceanGate depths
hackaday.com·1d
⚡Circuit Archaeology
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.com·1d
🔓Hacking
Flag this post
Embedding Leak Auditor
🕵️Vector Smuggling
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.org·2d
📝Log Parsing
Flag this post
Nirvana: A Specialized Generalist Model With Task-Aware Memory Mechanism
arxiv.org·2d
💻Local LLMs
Flag this post
Idor — TryHackMe writeup
infosecwriteups.com·1d
🌐DNS Security
Flag this post
Loading...Loading more...