Show HN: 1Pwned
🎯NTLM Attacks
Flag this post
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
infosecwriteups.com·23h
🔓Hacking
Flag this post
FPGA Brings Antique Processor to Life
hackaday.com·1d
🔧FPGA Preservation
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.com·2d
🧪Binary Fuzzing
Flag this post
Python Security Guide: Password Hashing, Encryption, Digital Signatures, and Secure Coding Practices
✅Checksum Validation
Flag this post
Tp-Link Router Deep Research
r0keb.github.io·17h
⚡Circuit Archaeology
Flag this post
PostgreSQL: MD5 password support is deprecated – updating the user passwords
dan.langille.org·2d
🧬PostgreSQL Forensics
Flag this post
One Weird Hashing Trick
📚Lempel-Ziv
Flag this post
800 Million Compromised Passwords — What You Need To Know
forbes.com·2d
🔓Hacking
Flag this post
Madhouse: Trolls
bluerenga.blog·9h
📼Retro Games
Flag this post
Building checksec without boundaries with Checksec Anywhere
blog.trailofbits.com·2d
🧪Binary Fuzzing
Flag this post
Better Than Original? 14 Rust-based Alternative CLI Tools to Classic Linux Commands
itsfoss.com·4h
⌨️Terminal Customization
Flag this post
<p>🔗 <a href="https://tonsky.me/blog/needy-programs/">Nikita Prokopov: Needy Programs</a></p>
lmika.org·1d
🔓Hacking
Flag this post
Some Sands & Mac tweaks thanks to ALTO and IIIF
updates.timsherratt.org·45m
📲Digitization
Flag this post
Node.js Security Checklist
🛡️WASM Security
Flag this post
Chrome extension “Safery” steals Ethereum wallet seed phrases
securityaffairs.com·2d
📡Feed Security
Flag this post
A treap week
🎨Graph Coloring
Flag this post
Loading...Loading more...