Introducing the Unicode Inflection Library Technical Preview Release
blog.unicode.orgยท3h
๐Ÿ”คCharacter Classification
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท10h
๐ŸŽซKerberos Exploitation
Flag this post
Federico Biancuzzi, Shane Warden, & Anders Hejlsberg
deprogrammaticaipsum.comยท2d
๐ŸšNordic Shell
Flag this post
Video security password was "Louvre", access control on Windows Server 2003
pcworld.comยท11hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.frยท1dยท
๐Ÿ”Information Retrieval
Flag this post
How phosphorylation helps ward off defects during reproduction
phys.orgยท4h
๐ŸงฌCopy Number Variants
Flag this post
Tech With Tim: 3 Unique Python Features You NEED To Know
dev.toยท12hยท
Discuss: DEV
๐Ÿ› Language Design
Flag this post
Show HN: Suites โ€“ modern unit tests framework for TypeScript back ends
github.comยท1dยท
Discuss: Hacker News
โš™๏ธWASM Runtime
Flag this post
Is This The Last PCB Youโ€™ll Ever Buy?
hackaday.comยท2d
โš™๏ธDIY Electronics
Flag this post
My 2025 Developer Tech Stack: From Code to Docs
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Flag this post
Prog8
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
Chain of Pattern: Rethink
dev.toยท3dยท
Discuss: DEV
๐Ÿ“Code Metrics
Flag this post
Managing long contexts in agentic coding systems
cto.newยท7hยท
Discuss: Hacker News
โœจEffect Handlers
Flag this post
Automated Anomaly Detection and Predictive Maintenance in Self-Propelled Brush Rollers Using Bayesian Network Fusion
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Flag this post
Secretome translation shaped by lysosomes and lunapark-marked ER junctions
nature.comยท7h
๐ŸงฌCopy Number Variants
Flag this post
Optimizing Thin-Film Deposition via Adaptive Q-Learning for E-Beam Evaporation
dev.toยท1dยท
Discuss: DEV
๐ŸงฎAlgorithmic Cooking
Flag this post
iFlyBot-VLA Technical Report
arxiv.orgยท19h
๐ŸŽ™๏ธWhisper
Flag this post
Conservation and alteration of mammalian striatal interneurons
nature.comยท7h
๐Ÿง Learned Codecs
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท3d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post