Flare-On 12: NTFSM - Solving a Finite State Machine with Binary Ninja
jhalon.github.ioยท3d
๐งชBinary Fuzzing
Flag this post
Node.js Security Checklist
๐ก๏ธWASM Security
Flag this post
M2dir specification - man.sr.ht
man.sr.htยท4h
๐ฆContent Addressing
Flag this post
Hardened Containers Look to Eliminate Common Source of Vulnerabilities
darkreading.comยท1d
๐ฆContainer Security
Flag this post
Update eyrie.org archive signing key
eyrie.orgยท9h
โ๏ธNixpkgs
Flag this post
Multiple Vulnerabilities in GoSign Desktop lead to Remote Code Execution
securityaffairs.comยท12h
๐กCybersecurity
Flag this post
Privilege escalation in LightDM Greeter by KDE (SUSE Security Team Blog)
lwn.netยท2d
๐ซKerberos Exploitation
Flag this post
PHP 8.5: The Silent Web Revolution
๐Language Evolution
Flag this post
This Week in Security: Landfall, Imunify AV, and Sudo Rust
hackaday.comยท1d
๐Hacking
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python โ A critical review
nocomplexity.comยท1d
๐Supply Chain
Flag this post
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
tenable.comยท1d
๐Hacking
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.comยท2d
๐Password Cracking
Flag this post
Weekly Bookmarks
inkdroid.orgยท4h
๐ฟFLAC Archaeology
Flag this post
1 or more little secrets of disksnapshot.exe
hexacorn.comยท9h
๐พDisk Utilities
Flag this post
Better Than Original? 14 Rust-based Alternative CLI Tools to Classic Linux Commands
itsfoss.comยท8h
โจ๏ธTerminal Customization
Flag this post
BentoPDF - The Privacy First PDF Toolkit
bentopdf.comยท3h
๐คEBCDIC Privacy
Flag this post
We opened a fake invoice and fell down a retro XWorm-shaped wormhole
malwarebytes.comยท2d
๐Hacking
Flag this post
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
infosecwriteups.comยท1d
๐Hacking
Flag this post
Loading...Loading more...