Abusing Delegation with Impacket (Part 2): Constrained Delegation
blackhillsinfosec.com·3h
Flag this post
[Testing Update] 2025-11-10 - Kernels, Systemd, Mkinitcpio, KDE Gear, Plasma
forum.manjaro.org·2d
Flag this post
Blood Sugar Battler: Building a Real Game as a Designer using AI
tympanus.net·6h
Flag this post
FileMarker.NET Home 2.2
giveawayoftheday.com·9h
Flag this post
Agentic coding with Google Jules
infoworld.com·1d
Flag this post
Introducing the Amazon OpenSearch Lens for the AWS Well-Architected Framework
aws.amazon.com·16h
Flag this post
Envoy From the Inside Out: A Developer's Guide - Akshita Agarwal, Airbnb
youtube.com·19h
Flag this post
Knowledge Graph Enhanced Reasoning for Automated Patent Claim Interpretation and Validity Assessment
🕸️Knowledge Graphs
Flag this post
Rust vs Go: Memory Management
Flag this post
RELEAP: Reinforcement-Enhanced Label-Efficient Active Phenotyping for Electronic Health Records
arxiv.org·12h
Flag this post
Versioning! and Versioning?
📦Nix Flakes
Flag this post
Sparse Federated Representation Learning for autonomous urban air mobility routing for low-power autonomous deployments
Flag this post
Gus Johnson recounts euphoric Indiana-Penn State football call: 'The moment you dream about'
nytimes.com·2h
Flag this post
Multi-modal Deepfake Detection and Localization with FPN-Transformer
arxiv.org·12h
Flag this post
EncouRAGe: Evaluating RAG Local, Fast, and Reliable
arxiv.org·2d
λFunctional Programming
Flag this post
Loading...Loading more...