Show HN: Steadykey โ€“ Deterministic Idempotency Keys with Pluggable Stores
npmjs.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฅExploit Development
Flag this post
Token-Optimized Notation Language
tonl.devยท3dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Python 3.14 Released and Other Python News for November 2025
realpython.comยท20h
๐Ÿฆ€Rust
Flag this post
The Law of Leaky Abstractions
joelonsoftware.comยท3hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
2 Years of ML vs. 1 Month of Prompting
levs.fyiยท1dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
pdxscript: VCS edition
blog.birbpara.deยท3d
๐Ÿฆ€Rust
Flag this post
Deep Learning for Molecules and Materials
dmol.pubยท1dยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
Erasing someone's entire code from the git
reddit.comยท20hยท
๐Ÿ’ฅExploit Development
Flag this post
c!n tester โ€“ Release Announcement
reddit.comยท2dยท
๐Ÿ”Reverse Engineering
Flag this post
Which approach is usually followed to populate DB with static values in go?
reddit.comยท1dยท
Discuss: r/golang
๐Ÿ’ฅExploit Development
Flag this post
Hot-Swapping and Microservitization-SPL Reporting
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Flag this post
Lepton โ€“ GPL Electronic Design Automation
github.comยท4hยท
Discuss: Hacker News
๐ŸŒBrowser Exploitation
Flag this post
See Your Word Count While You Write
lesswrong.comยท2h
๐Ÿ›Fuzzing
Flag this post
Fundamental Rewrite of the WebFormsJS Library in WebForms Core 2
dev.toยท12hยท
Discuss: DEV
๐Ÿฆ€Rust
Flag this post
The Security Logic Behind LLM Jailbreaking
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Flag this post
Facade Pattern โ€” Catalog of Enterprise Application Architecture Patterns ๐Ÿข
dev.toยท4dยท
Discuss: DEV
๐Ÿ”Reverse Engineering
Flag this post
Building a Real-Time Chat App with WebSockets
dev.toยท1hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Flag this post
Auth Series: Yet Another Password Authentication Flow.. but hear me out
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post