w1redch4d's Top FindsLoading...
Servant by construction – a blog series on Haskell's web stack gem
laurentrdc.xyz·8h·
Discuss: Hacker News
🦀Rust
Flag this post
ct.sh: the smallest CT/CD system
cceckman.com·1d
💥Exploit Development
Flag this post
C++26 std::execution vs. Rust's async/rayon: Two different philosophies for the future of concurrency?
reddit.com·1d·
Discuss: r/cpp
🦀Rust
Flag this post
Perplexity Browser turned my random Google searches into structured learning sessions
xda-developers.com·3h
🌐Browser Exploitation
Flag this post
MCUboot: Bootup Journey
dev.to·5h·
Discuss: DEV
🦀Rust
Flag this post
We Tested 6 AI Models on 3 Advanced Security Exploits: The Results
dev.to·1d·
Discuss: DEV
💥Exploit Development
Flag this post
Google sounds alarm on self-modifying AI malware
securityaffairs.com·1d
🌐Browser Exploitation
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Improving Rust Compile Times by 71 Percent
elijahpotter.dev·1d·
Discuss: Hacker News
🦀Rust
Flag this post
SVG participates in UNESCO 14th Youth Forum in Uzbekistan
searchlight.vc·15h
🐛Fuzzing
Flag this post
Building Test Suite for "repo-contextr" using "pytest"
dev.to·2h·
Discuss: DEV
🔬Static Analysis
Flag this post
Embedding TypeScript
andrews.substack.com·1d·
🦀Rust
Flag this post
Ollama, Nvidia Flaws Put AI Infrastructure at Risk
darkreading.com·8h
💥Exploit Development
Flag this post
[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
github.com·2d·
Discuss: r/programming
🔍Reverse Engineering
Flag this post
How to avoid the most common threats that compromise Windows
howtogeek.com·1d
🔒Security
Flag this post
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
socket.dev·1d·
Discuss: Hacker News
💥Exploit Development
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.au·2d·
Discuss: Hacker News
🦀Rust
Flag this post
If I made sure no kernels are running on my work Mac how much can my employer see of what I do?
reddit.com·7h·
Discuss: r/privacy
🌐Browser Exploitation
Flag this post
Trusting AI Output? Why Improper Output Handling is the New XSS
auth0.com·1d
🌐Browser Exploitation
Flag this post
Void-Vault: A deterministic generative solution to password management
github.com·1d·
Discuss: r/archlinux
💥Exploit Development
Flag this post
Why Code Execution is Eating Tool Registries
levelup.gitconnected.com·22h·
Discuss: r/programming
🦀Rust
Flag this post