Building a Process Injection Detector in Rust
🔍eBPF
Flag this post
Actually using ed | Arabesque
blog.sanctum.geek.nz·13h
📺VT100
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
what's a simple command or script that felt like a magic trick once you learned it?
🪟Awesome windows command-line
Flag this post
A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
techradar.com·3d
🏺Kerberos Archaeology
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🔎OSINT Techniques
Flag this post
[solved] backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.com·2d
💿Backup Strategies
Flag this post
Letting coding agents access runtime output (my current approach)
👁️System Observability
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·14h
📼Cassette Hacking
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·1d
🔤EBCDIC Privacy
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.com·17h
🛡Cybersecurity
Flag this post
Data General History by Foster
🔗Data Provenance
Flag this post
Loading...Loading more...