Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท3d
๐ŸŒWARC Forensics
FOSS Weekly #25.41: Windows 11 Fiasco, Ubuntu 25.10 Releasing, Joplin Tips, NeoVim Journals and More Linux Stuff
itsfoss.comยท3d
๐ŸงFOSS
Windows Product Activation Creator Reveals Truth Behind XP's Most Notorious Product Key
tech.slashdot.orgยท2d
๐ŸบKerberos Archaeology
Slashdot Is Down [503]
slashdot.orgยท3hยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท2dยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Building Resilient AI Agents on Serverless | Restate
restate.devยท2dยท
๐ŸงฑImmutable Infrastructure
SSH Security: Why You Should Touch to Verify
ubicloud.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Grafana Labs Extends AI Capabilities of Observability Platform
devops.comยท2d
๐Ÿ Homelab Automation
Chinese Hackers Breached Law Firm Williams and Connolly via Zero-Day
securityweek.comยท3dยท
๐Ÿ”“Hacking
Data leak at Sonicwall: All cloud backups of firewalls stolen
heise.deยท2dยท
๐Ÿดโ€โ˜ ๏ธPiracy
DEGS: Deformable Event-based 3D Gaussian Splatting from RGB and Event Stream
arxiv.orgยท2d
๐ŸŒ€Differential Geometry
How OpenTelemetry Works: Tracing, Metrics and Logs on Kubernetes
thenewstack.ioยท3d
๐Ÿ‘๏ธObservatory Systems
Go and PocketBase: Shortified!
dev.toยท3dยท
Discuss: DEV
โšกgRPC
The RubyGems โ€œsecurity incidentโ€
andre.arko.netยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
A 7-year-old CLI tool reborn with AI, meet gokill
reddit.comยท1dยท
Discuss: r/golang
๐ŸชŸAwesome windows command-line
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comยท2dยท
๐Ÿ“ผCassette Archaeology
Quantum-Aware Symbolic Defense System
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Cryptographic Archaeology
RecGen: a powerful tool to create recommendation systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Real-Time Anomaly Attribution via Hybrid Graph Neural Network & Causal Inference
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Vector Forensics
How we trained an ML model to detect DLL hijacking
securelist.comยท6d
๐Ÿ”—Binary Similarity