Detecting DLL hijacking with machine learning: real-world cases
securelist.comยท1h
๐ŸŽซKerberos Exploitation
Breaking Into HackTheBox: My Journey from Script Kiddie to Root
infosecwriteups.comยท2h
๐Ÿ”“Hacking
Security Affairs newsletter Round 544 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท21h
๐Ÿ›กCybersecurity
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท17hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Building a Command-Line Quiz Application in R
towardsdatascience.comยท19h
๐ŸšShell Calculus
Nix pills
nixos.orgยท1d
โ„๏ธNixpkgs
Inside the Unified Log 4: Log entries
eclecticlight.coยท2h
๐Ÿ“Log Parsing
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.comยท1d
๐Ÿ”Binary Forensics
Mole โ€“ Dig deep like a mole to clean your Mac
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Beginnerโ€™s guide to malware analysis and reverse engineering
intezer.comยท3d
๐Ÿฆ Malware Analysis
Linuxiac Weekly Wrap-Up: Week 40 (Sep 29 โ€“ Oct 5, 2025)
linuxiac.comยท9h
๐Ÿ”“Open Source Software
The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Network Automation
How we trained an ML model to detect DLL hijacking
securelist.comยท1h
๐Ÿ”—Binary Similarity
A History of Active Directory Security
adsecurity.orgยท2d
๐ŸบKerberos Archaeology
Red Stone One Carat โ€” TryHackMe Challenge Write-up
infosecwriteups.comยท1d
๐Ÿ›ก๏ธCLI Security
Tape Library and Show Off
i.redd.itยท10hยท
Discuss: r/homelab
๐Ÿ“ผCassette Archaeology
Python PEP 636 โ€“ Structural Pattern Matching: Tutorial
peps.python.orgยท22hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Two thought experiments
surfingcomplexity.blogยท1d
๐Ÿ‘๏ธSystem Observability
Valuable News โ€“ 2025/10/06
vermaden.wordpress.comยท6h
๐Ÿ”ŒOperating system internals