Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·7h
🎫Kerberos Exploitation
Flag this post
Securing critical infrastructure: Why Europe’s risk-based regulations matter
microsoft.com·3h
🛡Cybersecurity
Flag this post
gRPC Python, AsyncIO and multiprocess
blog.est.im·1d
⚡gRPC
Flag this post
are-dependent-types-actually-erased
🎯Dependent Types
Flag this post
I'm Selling No CS Degree
🚀Indie Hacking
Flag this post
Nintendo Store iOS App
📺Retrogaming
Flag this post
8BitDo’s latest wireless controllers can now shake-to-wake the Switch 2
theverge.com·1h
🕹️Retro Gaming
Flag this post
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
microsoft.com·2d
🌐WASI
Flag this post
Apple has released updates to XProtect and XProtect Remediator
eclecticlight.co·1d
🔌Operating system internals
Flag this post
Can LLMs subtract numbers?
💻Local LLMs
Flag this post
KDE Plasma 6.5.2 Released with Bug Fixes Across Discover, KWin, and More
linuxiac.com·1d
🕸️WASM Archives
Flag this post
Weekly: Questions and advice
📰RSS Reading Practices
Flag this post
From vibe coding to context engineering: 2025 in software development
🔄Language Evolution
Flag this post
Loading...Loading more...