Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท7hยท
Discuss: Hacker News
๐Ÿ”ฌBinary Analysis
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท12h
๐ŸงชBinary Fuzzing
Detecting Semantic Clones of Unseen Functionality
arxiv.orgยท1d
๐Ÿ”—Binary Similarity
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.comยท1d
๐Ÿ”“Decompilation
Mastering Zod Validation Mastering Data Validation and Error Handling in TypeScript with Zod
blog.codeminer42.comยท1d
โœ…Format Validation
Embedding Lua in Nim
lambdacreate.comยท2d
๐Ÿฆ€Rust Macros
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท13h
๐Ÿ“บVT100
Three Solutions to Nondeterminism in AI
blog.hellas.aiยท14hยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Building Resilient Operations Through ITIL-Based Incident Management
hackernoon.comยท1d
๐Ÿ”“Hacking
Research shines light on 'double-yielding' behavior in soft materials
phys.orgยท11h
๐ŸŒก๏ธPreservation Physics
22.00.0137 Your JDex is your PKM
johnnydecimal.comยท2h
๐Ÿง Personal Knowledge Base
Somatic mutation and selection at population scale
nature.comยท10h
๐ŸงฌCopy Number Variants
Closer to production quality Python notebooks with `marimo check`
marimo.ioยท1dยท
Discuss: Hacker News
โœ…Archive Validation
original โ†—
raymondcamden.comยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท2d
๐Ÿ”Cryptographic Archaeology
The Programmer Identity Crisis
hojberg.xyzยท13hยท
๐Ÿ”ฉSystems Programming
Thinking on upgrade my "microlab"
preview.redd.itยท4hยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup
Cactus Language โ€ข Semantics 2
inquiryintoinquiry.comยท12h
๐Ÿ”ขDenotational Semantics
Rust vs C, C++, Java & Python โ€” 5 Everyday Programs Compared
dev.toยท11hยท
Discuss: DEV
๐Ÿฆ€Rust Macros
Basketball trivia, editing distances, and derangement
leancrew.comยท6h
๐ŸŒณTrie Structures