[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
๐ฌStatic Analysis
Flag this post
The Best Smart Water-Leak Detector
nytimes.comยท14h
๐Security
Flag this post
Exploiting Data Structures for Bypassing and Crashing Anti-Malware Solutions via Telemetry Complexity Attacks
arxiv.orgยท4h
๐ฅExploit Development
Flag this post
Facade Pattern โ Catalog of Enterprise Application Architecture Patterns ๐ข
๐Security
Flag this post
I reverse engineered my cheap managed switch's firmware
xda-developers.comยท1d
๐Browser Exploitation
Flag this post
Screening Without Tagging
science.orgยท13h
๐Fuzzing
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Appleโs Binaries
๐ฅExploit Development
Flag this post
A Deep Dive into the Morris Worm
๐ฅExploit Development
Flag this post
Inside the Unified Log 7: Claude diagnoses the log
eclecticlight.coยท1h
๐ฆRust
Flag this post
<p>**Abstract:** This paper introduces a novel framework for automated, high-resolution longitudinal analysis of micro-structural changes in composite materials...
freederia.comยท7h
๐ฆRust
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comยท6h
๐Browser Exploitation
Flag this post
Stop Coding and Start Planning
every.toยท5m
๐ฆRust
Flag this post
An introduction to program synthesis (Part II) - Automatically generating features for machine learning
๐ฌStatic Analysis
Flag this post
Announcing Magika 1.0: now faster, smarter, and rebuilt in Rust
blogger.comยท13h
๐ฆRust
Flag this post
Hasleo Backup Suite Pro 5.5.2.1
giveawayoftheday.comยท1h
๐Browser Exploitation
Flag this post
Peeling Back the Plastic: Finding 0-Days in IoT Devices
bishopfox.comยท19h
๐Browser Exploitation
Flag this post
Loading...Loading more...