Uncovering network attack paths with runZeroHound
runzero.com·20h
🌐WARC Forensics
Flag this post
Using ChatGPT Atlas Agent Mode To Solve LeetCode Problems
blog.codeminer42.com·20h
⚙️Proof Engineering
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·1d
🛡️Proof-Carrying Archives
Flag this post
Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
news.risky.biz·1d
🔓Hacking
Flag this post
Locking it down: A new technique to prevent LLM jailbreaks
news.sophos.com·4d
🧪Binary Fuzzing
Flag this post
A phishing with invisible characters in the subject line, (Tue, Oct 28th)
isc.sans.edu·1h
🔤Character Encoding
Flag this post
"the densest and longest lasting human readable information storage media"
🌡️Preservation Physics
Flag this post
Building Better Software: Why Workflows Beat Code Every Time • Ben Smith & James Beswick • GOTO 2025
youtube.com·22h
🔄Reproducible Builds
Flag this post
Sora is showing us how broken deepfake detection is
theverge.com·19h
🎞️MKV Forensics
Flag this post
Hiding Processes from Ps or Top
📟Terminal Forensics
Flag this post
Introducing kerliix-oauth: A Node.js & Python Kerliix OAuth Library
🔓Open Source Software
Flag this post
What’s the difference between passwords and passkeys? It’s not just the protection they provide
🔐Quantum Security
Flag this post
Promptable Fire Segmentation: Unleashing SAM2's Potential for Real-Time Mobile Deployment with Strategic Bounding Box Guidance
arxiv.org·7h
🧮Kolmogorov Complexity
Flag this post
Ultra-Fast Wireless Power Hacking
arxiv.org·4d
📼Cassette Hacking
Flag this post
Loading...Loading more...