Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ“ŠHyperLogLog
New Data Exfiltration Technique Using Brave Sync
infosecwriteups.comยท56m
๐Ÿ”„Sync Engine
ELA-1534-1 freeipa security update
freexian.comยท21h
๐ŸŽซKerberos Exploitation
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.eduยท5d
๐Ÿ”NTLM Archaeology
Security Affairs newsletter Round 544 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท20h
๐Ÿ›กCybersecurity
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท12hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.orgยท3h
๐Ÿ”งHardware Verification
A History of Active Directory Security
adsecurity.orgยท2d
๐ŸบKerberos Archaeology
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.comยท21h
๐Ÿ”eBPF
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท16hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Public Key Infrastructure with Secure Shell
free-pmx.orgยท1dยท
Discuss: r/homelab
๐ŸŽฏNTLM Attacks
Plugin Secure
rya.ncยท1dยท
Discuss: Hacker News
โœ…Checksum Validation
Optimizing a QuickTake Image Decoder for the Apple IIโ€™s 6502
hackaday.comยท14h
๐ŸŽApple II Heritage
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.toยท3hยท
Discuss: DEV
๐Ÿ“Code Metrics
Countless security vulnerabilities in Dell PowerProtect Data Domain closed
heise.deยท11h
๐Ÿ”“Hacking
Red Stone One Carat โ€” TryHackMe Challenge Write-up
infosecwriteups.comยท1d
๐Ÿ›ก๏ธCLI Security
Abracadabra Money Hack Analysis
blog.verichains.ioยท3h
๐ŸŽซKerberos Attacks
1Password CLI Vulnerability
codeberg.orgยท1dยท
๐Ÿ›ก๏ธCLI Security
Inside the Unified Log 4: Log entries
eclecticlight.coยท1h
๐Ÿ“Log Parsing