System Instruction Fixed Point
funcall.blogspot.com·1d·
Proof Automation
shell: reusing commands and parameters with bashisms
michal.sapka.pl·1h
🧩Shell Metaprogramming
Show HN: Universal single-letter project commands to speed up your CLI workflow
github.com·1d·
Discuss: Hacker News
🪟Awesome windows command-line
Pleasant Imperative Program Proofs with GallinaC
arxiv.org·16h
⚔️Lean Tactics
Brzozowski Derivatives: An Exercise in Combinatory Style
blog.zdsmith.com·1d·
🔗Concatenative Programming
Discord as a C2 and the cached evidence left behind
pentestpartners.com·1d
📟Terminal Forensics
Another beachfront stilt house collapses into the surf on the Outer Banks
the-independent.com·4h
🔀XSLT
2025-09-17: Classic Machine Learning Models and XAI Methods
ws-dl.blogspot.com·46m·
🧠Machine Learning
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
portswigger.net·8h
🧪Protocol Fuzzing
How can I get my shell thumbnail extractors to run in the same process?
devblogs.microsoft.com·2h
🔄Archival Workflows
The Anatomy of an SSH Config
chuck.is·1d
📦Container Security
Python 3.14 Preview: REPL Autocompletion and Highlighting
realpython.com·6h
🪟Awesome windows command-line
Hack to the Future — here's how you can write BASIC code on a modern-day PC
tomshardware.com·9h
📟Terminal Physics
The peril of unquoted Python strings, and how they caused CVE-2024-9287
pythonkoans.substack.com·1d·
Discuss: Substack
Shell Verification
CHMLib 0.40a Integer Overflow in _unmarshal_int32 / _unmarshal_uint32 During CHM Header Parsing
seclists.org·1d
Format Verification
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·1d
🛡️CLI Security
What Makes System Calls Expensive: A Linux Internals Deep Dive
blog.codingconfessions.com·1d·
Discuss: Hacker News
🔩Systems Programming
RAG Explained: Understanding Embeddings, Similarity, and Retrieval
towardsdatascience.com·1h
📊Multi-vector RAG
Reading Between the Lines: Satisfaction Analysis from Untagged Chatbot Conversations
blog.checkpoint.com·7h
🎙️Whisper
Such a Classic
blog.hermesloom.org·2h·
Discuss: Hacker News
🧠Intelligence Compression