Feeds to Scour
SubscribedAll
Show HN: aero.zip - I over-engineered a file transfer service (E2EE, not P2P)
aero.zip·8h·
Discuss: Hacker News
🏺ZIP Archaeology
Preview
Report Post
Tier list of Linux security mechanisms (2024)
blog.ce9e.org·5h·
Discuss: Lobsters
🛡️CLI Security
Preview
Report Post
I Built a File System MCP Server — Here's Why Permissions Matter More Than Features
dev.to·5h·
Discuss: DEV
🛡️CLI Security
Preview
Report Post
exploits.club Weekly(ish) Newsletter 93 - Old QEMU Bugs, Android Auto Bluetooth PoCs, BeeStation P20, and More
blog.exploits.club·3d
🔓Hacking
Preview
Report Post
OpenBSD's Propolice stack protector origins
discoverbsd.com·8h
🔌Operating system internals
Preview
Report Post
What Is an Exploit? Vulnerabilities and Threat Mitigation
securityscorecard.com·2d
🔓Hacking
Preview
Report Post
A look at an Android ITW DNG exploit
googleprojectzero.blogspot.com·2d·
🖼️JPEG Forensics
Preview
Report Post
Zip Files as (Simple) Key-Value Stores
benjamincongdon.me·2d
🏺ZIP Archaeology
Preview
Report Post
I now have an LTO library! (Need help with backup plans)
reddit.com·1d·
Discuss: r/homelab
💿Backup Strategies
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.com·2d
Format Verification
Preview
Report Post
Seven Cybersecurity Tips for 2026 No One Will Tell You About
cacm.acm.org·2d
🎯Threat Hunting
Preview
Report Post
Metasploit Wrap-Up 12/12/2025
rapid7.com·2d
🔓Hacking
Preview
Report Post
Rich Headers: leveraging this mysterious artifact of the PE format
virusbulletin.com·1d·
Discuss: Hacker News
🏺Format Archaeology
Preview
Report Post
WinRAR: Code smuggling vulnerability is being attacked
heise.de·3d
💣Compression Security
Preview
Report Post
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.com·2d·
Discuss: Hacker News
🌳Archive Merkle Trees
Preview
Report Post
Installing Every NixOS Package
unnamed.website·3d·
Discuss: Hacker News
❄️Nixpkgs
Preview
Report Post
All About Android Pentesting
infosecwriteups.com·4d
🦠Malware Analysis
Preview
Report Post
Notepad++ fixed updater bugs that allowed malicious update hijacking
securityaffairs.com·1d
🔓Hacking
Preview
Report Post
How to Securely Store Secrets in Environment Variables
blog.miguelgrinberg.com·5h
🔐Archive Encryption
Preview
Report Post
REshare Ramblings - Bad Vibes with IDA
scrapco.de·1d
🔧KAITAI
Preview
Report Post