The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comยท3d
๐OSINT Techniques
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท20h
๐ผCassette Hacking
Flag this post
NEWS ROUNDUP โ 21st November 2025
digitalforensicsmagazine.comยท2d
๐จIncident Response
Flag this post
Actually using ed | Arabesque
blog.sanctum.geek.nzยท18h
๐บVT100
Flag this post
What reverse proxy based web application firewall (WAF) based on open source are you using?
๐DNS Security
Flag this post
Gitoxide in November
๐ฆGit LFS
Flag this post
Apple's Problem with Bodies
๐Brotli Dictionary
Flag this post
Show HN: TriView Explorer โ Multi-pane file explorer for deep folders
โทBidirectional Programming
Flag this post
How Wipro PARI accelerates PLC code generation using Amazon Bedrock
aws.amazon.comยท1d
โ๏ธPL Implementation
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.comยท1d
๐Concrete Syntax
Flag this post
Built Bittorrent in go
๐BitTorrent
Flag this post
Letting coding agents access runtime output (my current approach)
๐๏ธSystem Observability
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
๐ง
Tor Networks
Flag this post
The Secret Life of Go
๐ฏGradual Typing
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.orgยท2d
๐คAdvanced OCR
Flag this post
Loading...Loading more...