Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4h
🔐Cryptographic Archaeology
1Password CLI Vulnerability
codeberg.org·1d·
🛡️CLI Security
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.com·2d
📟Terminal Forensics
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·3h
📦Container Security
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🎯NTLM Attacks
Python PEP 636 – Structural Pattern Matching: Tutorial
peps.python.org·1d·
Discuss: Hacker News
📝Concrete Syntax
Sonne 4.5 keeps blowing my mind
curzel.it·1d·
Discuss: Hacker News
🔒Linear Types
Metasploit Wrap-Up 10/03/2025
rapid7.com·2d
🛡️CLI Security
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·21h·
Discuss: Hacker News
🛡️WASM Security
DanielSant0s/AthenaEnv
github.com·1d
📺VT100 Emulation
How to Get Notified on SSH Logins on Linux
linuxiac.com·1d
🛡️CLI Security
Shellshock
dwheeler.com·5d·
📟Terminal Forensics
Oily Pine – Chapter 1
yosemitesam.ch·12h·
Discuss: Hacker News
🐚Bash Monads
OpenSSH 10.1/10.1p1 Released
openssh.com·9h·
Discuss: Hacker News
🔐HSM Integration
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·8h
🎫Kerberos Exploitation
Simple automated deployments using Git push (2024)
garrido.io·10h·
📦Git LFS
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·12h
🔧Hardware Verification
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·1h
🔐Certificate Analysis
Cap'n Proto in WASM
mikel.xyz·7h·
Discuss: Hacker News
🌐WASI
OpenAI Guardrails: A Framework to Keep LLM Apps Safe and Reliable
openai.github.io·32m·
Discuss: Hacker News
🛡️CLI Security