Building a Process Injection Detector in Rust
github.com·1d·
🔍eBPF
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.to·15h·
Discuss: DEV
📡Network Monitoring
Flag this post
Actually using ed | Arabesque
blog.sanctum.geek.nz·11h
📺VT100
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·8h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
what's a simple command or script that felt like a magic trick once you learned it?
reddit.com·17h·
Discuss: r/linux
🪟Awesome windows command-line
Flag this post
eBPF Rootkit
synacktiv.com·12h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
techradar.com·3d
🏺Kerberos Archaeology
Flag this post
What is GNU Emacs and do you want a copy? (1986)
gnu.org·7h·
Discuss: Hacker News
📟Terminals
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🔎OSINT Techniques
Flag this post
[solved] backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.com·2d
💿Backup Strategies
Flag this post
Letting coding agents access runtime output (my current approach)
foundinglean.substack.com·5h·
Discuss: Substack
👁️System Observability
Flag this post
Show HN: Jsonl Viewer Pro – Open 5GB Security Logs Instantly on Mac
iotdata.systems·13h·
Discuss: Hacker News
🌊Stream Processing
Flag this post
Edition 3 – Journalism from the command line, part 1
buttondown.com·5d·
Discuss: Hacker News
🤖Archive Automation
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.com·20h·
Discuss: Substack
🔩Systems Programming
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·12h
📼Cassette Hacking
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.com·14h
🛡Cybersecurity
Flag this post