Infinite Footguns: Writing a JavaScript Interpreter in JavaScript
scour.ingยท1d
โšกProof Automation
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.euยท4d
๐Ÿ”NTLM Forensics
What Recent Cyber Attacks Reveal About Readiness in 2025
rapid7.comยท2h
๐ŸšจIncident Response
The Unix philosophy applied to development environments
byronsharman.comยท3dยท
Discuss: Hacker News
๐ŸšShell Calculus
You should look into self hosting
perpheads.comยท15hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Cowsay as a Service (CaaS) โ€” PicoCTF Walkthrough
infosecwriteups.comยท2d
๐ŸงชCBOR Fuzzing
Design Principle: Composable Services
sleepingpotato.comยท3hยท
Discuss: Hacker News
โšกgRPC
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.comยท19hยท
Discuss: r/linux
๐Ÿ”’Secure Boot
Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day
cybersecuritydive.comยท1h
๐Ÿ”“Hacking
Cap'n Proto in WASM
mikel.xyzยท8hยท
Discuss: Hacker News
๐ŸŒWASI
A UK Police Force Suspends Working From Home After Finding Automated Keystroke Scam
news.slashdot.orgยท1d
๐Ÿ”NTLM Forensics
expressjs/express
github.comยท15h
โšกProof Automation
When your โ€œhome serverโ€ draws more power than your neighborโ€™s sauna
i.redd.itยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
Evaluating Coding Agents with Terminal-Bench 2.0
snorkel.aiยท2dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.proยท10hยท
Discuss: Hacker News
๐Ÿ’จCache Optimization
Sonne 4.5 keeps blowing my mind
curzel.itยท1dยท
Discuss: Hacker News
๐Ÿ”’Linear Types
In the Crosshairs: A Deep Dive into the MGM Resorts Cyber Attack - A Masterclass in Social Engineering
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Turning Gemini CLI into a Multi-Agent System with Just Prompts
aipositive.substack.comยท2dยท
Discuss: Substack
๐ŸšShell Automation
A simple CLI tool to run network tests from locations
github.comยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.toยท12hยท
Discuss: DEV
๐Ÿ“Code Metrics