A security platform to ruin your next weekend 😍
google.com·2h·
Discuss: r/selfhosted
🌐Browser Exploitation
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·7h
💥Exploit Development
Flag this post
Void-Vault: A deterministic generative solution to password management
github.com·16h·
Discuss: r/archlinux
💥Exploit Development
Flag this post
How to avoid the most common threats that compromise Windows
howtogeek.com·19h
🌐Browser Exploitation
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.net·1d
🌐Browser Exploitation
Flag this post
A Security Model for Systemd
lwn.net·1d·
🦀Rust
Flag this post
Participants ready to make use of Financial literacy training
searchlight.vc·5h
🐛Fuzzing
Flag this post
Google Probes Weeks-Long Security Breach Linked to Contractor Access
blogger.com·20h
🌐Browser Exploitation
Flag this post
The Secrets of Cyber Security That Experts Don't Share
dev.to·3h·
Discuss: DEV
💥Exploit Development
Flag this post
Keeper Security's Industry-First Forcefield™ Protects Against Memory-Based Attacks on Windows Endpoints
prnewswire.com·1d
🌐Browser Exploitation
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.org·19h·
Discuss: Hacker News
💥Exploit Development
Flag this post
InfoSec News Nuggets 11/06/2025
aboutdfir.com·1d
💥Exploit Development
Flag this post
Tracking Down Progressively-Enhanceable APIs
willhbr.net·12m
💥Exploit Development
Flag this post
How to Run Linux Commands without Typing Sudo Password
ubuntushell.com·1h
💥Exploit Development
Flag this post
The best new feature in Windows 11 isn’t Copilot
makeuseof.com·19h
🌐Browser Exploitation
Flag this post
Have I Been Pwned adds a billion new passwords to its database
ghacks.net·19h
🌐Browser Exploitation
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
theregister.com·22h·
Discuss: Hacker News
🌐Browser Exploitation
Flag this post
Update: Added JWT detection + policy config to my open-source secrets scanner due to feedback
reddit.com·11h·
Discuss: r/selfhosted
🌐Browser Exploitation
Flag this post
How to Secure Your Android Device When You’re a Busy Student
androidheadlines.com·2d
🌐Browser Exploitation
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·1d
💥Exploit Development
Flag this post