The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comยท3d
๐Ÿ”ŽOSINT Techniques
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท20h
๐Ÿ“ผCassette Hacking
Flag this post
NEWS ROUNDUP โ€“ 21st November 2025
digitalforensicsmagazine.comยท2d
๐ŸšจIncident Response
Flag this post
Actually using ed | Arabesque
blog.sanctum.geek.nzยท18h
๐Ÿ“บVT100
Flag this post
What reverse proxy based web application firewall (WAF) based on open source are you using?
reddit.comยท1dยท
Discuss: r/homelab
๐ŸŒDNS Security
Flag this post
Gitoxide in November
github.comยท18hยท
Discuss: r/rust
๐Ÿ“ฆGit LFS
Flag this post
Apple's Problem with Bodies
drobinin.comยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Flag this post
Show HN: TriView Explorer โ€“ Multi-pane file explorer for deep folders
news.ycombinator.comยท14hยท
Discuss: Hacker News
โŸทBidirectional Programming
Flag this post
How Wipro PARI accelerates PLC code generation using Amazon Bedrock
aws.amazon.comยท1d
โš™๏ธPL Implementation
Flag this post
Evaluating Web Browsing Agents for Some Practical Use Cases
theautomatedoperator.substack.comยท1dยท
Discuss: Substack
๐Ÿ•ต๏ธFeed Discovery
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.comยท1d
๐Ÿ“Concrete Syntax
Flag this post
FAWK: LLMs can write a language interpreter
martin.janiczek.czยท2dยท
๐Ÿฆ€Rust Macros
Flag this post
Built Bittorrent in go
reddit.comยท1dยท
Discuss: r/golang
๐ŸŒŠBitTorrent
Flag this post
Information Literacy and Chatbots as Search
buttondown.comยท16hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Reading Practices
Flag this post
Letting coding agents access runtime output (my current approach)
foundinglean.substack.comยท12hยท
Discuss: Substack
๐Ÿ‘๏ธSystem Observability
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
dev.toยท6hยท
Discuss: DEV
๐Ÿง…Tor Networks
Flag this post
The Secret Life of Go
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏGradual Typing
Flag this post
Ask HN: Looking for a donated PC or laptop for freelance work
news.ycombinator.comยท2hยท
Discuss: Hacker News
๐ŸŽApple Computing
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.orgยท2d
๐Ÿค–Advanced OCR
Flag this post
Peer-to-peer ephemeral public communities
getaether.netยท2dยท
Discuss: Hacker News
๐ŸŒWebRTC Archives
Flag this post