After deleting a web server, I started checking what I typed before hitting 'Enter'
theregister.comยท12h
๐Ÿ Personal Archives
Which Environment Variables Does an SSH Session Actually Load?
pixelstech.netยท1d
โœ…Shell Verification
Digital Forensics Jobs Round-Up, September 15 2025
forensicfocus.comยท4h
๐ŸšจIncident Response
Show HN: Building an open-source agentic terminal
davehudson.ioยท2hยท
Discuss: Hacker News
๐Ÿ“ŸTerminals
OTW - Bandit Level 4 to Level 5
tbhaxor.comยท13h
๐Ÿ”งKAITAI
Sprites mods - Hard disk hacking - Intro
web.archive.orgยท5h
๐ŸŽฎCartridge Archaeology
Project: Pi Stats
connortumbleson.comยท16h
๐Ÿ•ต๏ธDomain Enumeration
Valuable News โ€“ 2025/09/15
vermaden.wordpress.comยท10h
๐Ÿ”ŒOperating system internals
Kioptrix Level 2
infosecwriteups.comยท2d
๐Ÿ•ต๏ธPenetration Testing
Investigating Feature Attribution for 5G Network Intrusion Detection
arxiv.orgยท15h
๐Ÿ‘๏ธPerceptual Hashing
Sept 2025 โ€“ MacAdmins Meeting
apple.lib.utah.eduยท1h
๐ŸŽApple Archive
Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers
securelist.comยท9h
๐Ÿ”“Hacking
Analyzing Lisp Redux: One Form At a Time
funcall.blogspot.comยท4hยท
๐Ÿ”—Lisp
Cleaning Up My $Home with XDG Base Directory Specification
evgeniipendragon.comยท2hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days
willsroot.ioยท1dยท
๐Ÿ›ก๏ธeBPF Security
15th September โ€“ Threat Intelligence Report
research.checkpoint.comยท6h
๐ŸŽซKerberos Exploitation
The State of Adversarial Prompts
blog.securitybreak.ioยท1d
๐ŸŽฏThreat Hunting
Authorities ID woman found dead in Sonoma County home as search for suspect continues
mercurynews.comยท5h
๐ŸšจIncident Response
A set of smooth, fzf-powered shell aliases&functions for systemctl
silverrainz.meยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCLI Security