Flare-On 12: NTFSM - Solving a Finite State Machine with Binary Ninja
jhalon.github.ioยท3d
๐ŸงชBinary Fuzzing
Flag this post
Node.js Security Checklist
blog.risingstack.comยท7hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Flag this post
M2dir specification - man.sr.ht
man.sr.htยท4h
๐Ÿ“ฆContent Addressing
Flag this post
Hardened Containers Look to Eliminate Common Source of Vulnerabilities
darkreading.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
Update eyrie.org archive signing key
eyrie.orgยท9h
โ„๏ธNixpkgs
Flag this post
Multiple Vulnerabilities in GoSign Desktop lead to Remote Code Execution
securityaffairs.comยท12h
๐Ÿ›กCybersecurity
Flag this post
Privilege escalation in LightDM Greeter by KDE (SUSE Security Team Blog)
lwn.netยท2d
๐ŸŽซKerberos Exploitation
Flag this post
PHP 8.5: The Silent Web Revolution
dev.toยท4hยท
Discuss: DEV
๐Ÿ”„Language Evolution
Flag this post
This Week in Security: Landfall, Imunify AV, and Sudo Rust
hackaday.comยท1d
๐Ÿ”“Hacking
Flag this post
File duplicate eliminator multi-threaded, GPU-enabled
github.comยท2dยท
Discuss: r/homelab
๐ŸบZIP Archaeology
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python โ€“ A critical review
nocomplexity.comยท1d
๐Ÿ”—Supply Chain
Flag this post
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
tenable.comยท1d
๐Ÿ”“Hacking
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.comยท2d
๐Ÿ”“Password Cracking
Flag this post
Weekly Bookmarks
inkdroid.orgยท4h
๐Ÿ’ฟFLAC Archaeology
Flag this post
1 or more little secrets of disksnapshot.exe
hexacorn.comยท9h
๐Ÿ’พDisk Utilities
Flag this post
Better Than Original? 14 Rust-based Alternative CLI Tools to Classic Linux Commands
itsfoss.comยท8h
โŒจ๏ธTerminal Customization
Flag this post
BentoPDF - The Privacy First PDF Toolkit
bentopdf.comยท3h
๐Ÿ”คEBCDIC Privacy
Flag this post
Xen exploitation part 1: XSA-105, from nobody to root
blog.quarkslab.comยท17hยท
Discuss: Hacker News
๐Ÿ‘‘RISC-V Privilege
Flag this post
We opened a fake invoice and fell down a retro XWorm-shaped wormhole
malwarebytes.comยท2d
๐Ÿ”“Hacking
Flag this post
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
infosecwriteups.comยท1d
๐Ÿ”“Hacking
Flag this post