Feeds to Scour
SubscribedAll
Scoured 9566 posts in 4.92 s
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.io·8h·
Discuss: DEV
🔐Capability Systems
Preview
Report Post
Cracking the Code: A Walkthrough of the Fam Product Security Challenge
infosecwriteups.com
·2d
🧪Binary Fuzzing
Preview
Report Post
Show HN: AgentCmds – A directory of slash commands for AI agents
agentcmds.work·14h·
Discuss: Hacker News
Proof Automation
Preview
Report Post
I’m tired of calling glued-together scripts “workflow automation”
dev.to·13h·
Discuss: DEV
🌊Stream Processing
Preview
Report Post
Introducing Pkl, a programming language for configuration
pkl-lang.org·5h
💧Liquid Types
Preview
Report Post
Project idea: Bring “Enterprise-Grade” SWG/DLP Concepts to the Homelab as an Easy Docker Privacy Gateway
reddit.com·1d·
Discuss: r/selfhosted
🏠Homelab Federation
Preview
Report Post
git rebase (Al Viro; Linus Torvalds; Theodore Tso)
yarchive.net·1d
🌳Git Internals
Preview
Report Post
Department of Computer Science and Technology – Technical reports: UCAM-CL-TR-949
cl.cam.ac.uk·2h·
Discuss: Hacker News
🔩Systems Programming
Preview
Report Post
AI Has Made it Easy to Own Your Tools
jimmyhmiller.github.io·1d
🤖Archive Automation
Preview
Report Post
The Frontend Auth Middleware: Cross-Origin Iframes Without Third-Party Cookies
seg6.space·2d·
Discuss: Hacker News
🌐WASI
Preview
Report Post
Show HN: Code webapps like it is 2010 – with agents & modern tech. A starter
github.com·13h·
Discuss: Hacker News
📏Code Metrics
Preview
Report Post
GHC 9.12.3 is now available
haskell.org·1d
💧Liquidhaskell
Preview
Report Post
Fuzzing.in
fuzzing.in·2h
🐛Fuzzing
Preview
Report Post
Virtualization: Theory to Silicon
pooladkhay.com·10h·
Discuss: Hacker News
👑RISC-V Privilege
Preview
Report Post
Here's why GitHub Pages is the best option for (most) free websites
howtogeek.com·2d
🔓Open Source Software
Preview
Report Post
Cybersecurity Snapshot: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics
tenable.com·1d
💾Persistence Strategies
Preview
Report Post
From Intent to Proof: Dafny Verification for Web Apps
midspiral.com·1d·
🏛️Agda
Preview
Report Post
Bypass Windows user interface privilege isolation via the CTF input method proto
projectzero.google·1d·
Discuss: Hacker News
🎯NTLM Attacks
Preview
Report Post
Why Rust is Revolutionizing Game Development: Memory Safety Meets High Performance
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Preview
Report Post
A Linux User’s Approach to Local, Privacy-Respecting Image Editing using Local AI Model
reddit.com·1d·
Discuss: r/linux
📸PNG Optimization
Preview
Report Post