wastrel, a profligate implementation of webassembly
wingolog.org·21h·
🌐WASI
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
Guide: TLS and QUIC
moq.dev·5h·
Discuss: Hacker News
🌐DNS over QUIC
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Hack the Box: Nibbles Walkthrough
infosecwriteups.com·13h
📟Terminal Forensics
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
When Is WebAssembly Going to Get DOM Support?
cacm.acm.org·4d
🧩WASM Components
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
HTML Minifier: A 12-Year Journey Building and Maintaining an Open Source Tool
deanhume.com·1d
🔄Language Evolution
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·11h
🛡️eBPF Security
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·1d·
Discuss: Substack
🧪Binary Fuzzing
Flag this post
How to find DNN Software installations on your network
runzero.com·3h
🛡️Security Headers
Flag this post
Building Up And Sanding Down
endler.dev·20h
🔩Systems Programming
Flag this post
Today I Learned: Binfmt_misc
dfir.ch·10h·
Discuss: Hacker News
🐚Nordic Shell
Flag this post
What is the most durable, portable, and secure form of software?
gods.art·4h·
Discuss: Hacker News
🕸️WebAssembly
Flag this post
Show HN: rstructor, Pydantic+instructor for Rust
github.com·1h·
Discuss: Hacker News
🔒Linear Types
Flag this post
Show HN: Run SQL queries directly on your website
embedded.sql-workbench.com·6h·
Discuss: Hacker News
🗄️Database Internals
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·1d
📦Container Security
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·7h·
Discuss: Hacker News
🔍NTLM Forensics
Flag this post