Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท2hยท
Discuss: Hacker News
๐Ÿ”ฌBinary Analysis
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท7h
๐ŸงชBinary Fuzzing
Detecting Semantic Clones of Unseen Functionality
arxiv.orgยท1d
๐Ÿ”—Binary Similarity
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.comยท1d
๐Ÿ”“Decompilation
Mastering Zod Validation Mastering Data Validation and Error Handling in TypeScript with Zod
blog.codeminer42.comยท1d
โœ…Format Validation
Embedding Lua in Nim
lambdacreate.comยท2d
๐Ÿฆ€Rust Macros
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท8h
๐Ÿ“บVT100
Three Solutions to Nondeterminism in AI
blog.hellas.aiยท8hยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Building Resilient Operations Through ITIL-Based Incident Management
hackernoon.comยท1d
๐Ÿ”“Hacking
Research shines light on 'double-yielding' behavior in soft materials
phys.orgยท6h
๐ŸŒก๏ธPreservation Physics
Somatic mutation and selection at population scale
nature.comยท5h
๐ŸงฌCopy Number Variants
Closer to production quality Python notebooks with `marimo check`
marimo.ioยท23hยท
Discuss: Hacker News
โœ…Archive Validation
original โ†—
raymondcamden.comยท21hยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท2d
๐Ÿ”Cryptographic Archaeology
The Programmer Identity Crisis
hojberg.xyzยท8hยท
๐Ÿ”ฉSystems Programming
Cactus Language โ€ข Semantics 2
inquiryintoinquiry.comยท7h
๐Ÿ”ขDenotational Semantics
Rust vs C, C++, Java & Python โ€” 5 Everyday Programs Compared
dev.toยท6hยท
Discuss: DEV
๐Ÿฆ€Rust Macros
Basketball trivia, editing distances, and derangement
leancrew.comยท1h
๐ŸŒณTrie Structures
Why Haskell is the perfect fit for renewable energy tech
mrcjkb.devยท11hยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
Polymorphic Python Malware, (Wed, Oct 8th)
isc.sans.eduยท13h
๐Ÿ”“Hacking