Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·3d
🧪Binary Fuzzing
Cranemail: $75 Lifetime email host, 250gb storage, unlimited domains and aliases
namecrane.com·5h·
Discuss: Hacker News
🏠Homelab Preservation
Practical Guide to Production-Grade Observability in the JS ecosystem
medium.com·7h
👁️System Observability
Strategic Pagination Patterns for APIs
roxeem.com·9h·
Discuss: Hacker News
📏Range Queries
Why do CPUs have multiple cache levels?
fgiesen.wordpress.com·5h·
Discuss: Hacker News
Cache Theory
Tools Amplify Culture – Platform Engineering
platformengineering.org·1h·
Discuss: Hacker News
❄️Nix Adoption
Replacing the Type Checker for the Swift Compiler
forums.swift.org·2d·
Discuss: Hacker News
💧Liquid Types
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·1d·
Discuss: Hacker News
🚀Indie Hacking
Show HN: Using Haskell to write an NES emulator
github.com·3h·
Discuss: Hacker News
🕹Emulation
go-async, a type-Safe, retryable, and deterministic concurrency for Go
reddit.com·1d·
Discuss: r/golang
🦀Rust Borrowing
Show HN: Static builds of popular open source libraries on npmjs.org
github.com·1d·
Discuss: Hacker News
🔓Open Source Software
Effective Web Scraping with Python: Building a Robust Data Pipeline for Price Monitoring
dev.to·1d·
Discuss: DEV
🕵️Feed Discovery
I Built the Perfect Workflow and attracted some friends in the process
graemefawcett.ca·1d·
Discuss: Hacker News
Proof Automation
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·1d
🕵️Vector Smuggling
Every Line of Code Is a Philosophy in Disguise
dev.to·1d·
Discuss: DEV
⚖️Emulation Ethics
How to Reject a Pull Request
github.com·3h·
Discuss: Hacker News
💣ZIP Vulnerabilities
What's your workflow to pass cloud secrets/config metadata to apps safely?
news.ycombinator.com·1d·
Discuss: Hacker News
🛡️Preservation Proofs
Tool or Agent? The impact of AI in your code and in your wallet It all boils down to math again!
blog.codeminer42.com·2d
Proof Automation
Exposing Citation Vulnerabilities in Generative Engines
arxiv.org·2d
📜Digital Philology
More Than Code: Gearing Up for the Hackathon of the Year!🚀
dev.to·3h·
Discuss: DEV
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing