Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·1d
🎫Kerberos Exploitation
Flag this post
Windows on Gigabyte MZ33-AR1 (AMD Turin) with Coreboot – ACPI and Bug Fixes
🛡️RISC-V Security
Flag this post
Up and Down the Ladder of Abstraction
🔲Cellular Automata
Flag this post
Show HN: I'm making an Open-source Japanese learning App inspired by Monkeytype
🇯🇵Japanese Computing
Flag this post
Disciplined Biconvex Programming
arxiv.org·2d
🎯Performance Proofs
Flag this post
Show HN: ReadMyMRI DICOM native preprocessor with multi model consensus/ML pipes
🔄Archival Workflows
Flag this post
Benchmarking Federated Learning Frameworks for Medical Imaging Deployment: A Comparative Study of NVIDIA FLARE, Flower, and Owkin Substra
arxiv.org·2d
🌐Federated Search
Flag this post
Probing Knowledge Holes in Unlearned LLMs
arxiv.org·2d
🧪Binary Fuzzing
Flag this post
The Hidden Ledger of Code: Tracking the Carbon Debt Inside Our Software
hackernoon.com·5d
📏Code Metrics
Flag this post
Energy Loss Functions for Physical Systems
arxiv.org·1d
🌡️Preservation Thermodynamics
Flag this post
A beginner's guide to the Flux-Fast model by Prunaai on Replicate
🌊Streaming Algorithms
Flag this post
AI Models Write Code with Security Flaws 18–50% of the Time, New Study Finds
📏Code Metrics
Flag this post
Loading...Loading more...