Show HN: DeepFake โ€“ Free AI Face Swap Online
deepfakefusion.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Pixel Art Filtering
jorenjoestar.github.ioยท56mยท
Discuss: Hacker News
๐Ÿ›ก๏ธMemory Safety
Flag this post
Introducing IndQA
openai.comยท17hยท
Discuss: Hacker News
๐Ÿค–ai
Flag this post
Ansible Release 12: the Windows Vista Moment
blog.ipspace.netยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Why your AI evals keep breaking
atla-ai.comยท5hยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
Show HN: ClipGuard- A PySide6 clipboard guardian with masking and history search
github.comยท6hยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
AI Uses Functions to Fetch Real Data (Not Just Chat)
farukalpay.substack.comยท3hยท
Discuss: Substack
๐Ÿค–ai
Flag this post
Nostr is deceptively tricky to understand
njump.meยท1dยท
๐Ÿ“ฆSandboxing
Flag this post
CHERIoT 1.0 Released
cheriot.orgยท23hยท
โšกRISC-V
Flag this post
Show HN: Safebox: Open-source framework for managing self-hosted apps (Beta)
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
How to get the GOT address from a PLT stub using GDB
rafaelbeirigo.github.ioยท2dยท
Discuss: Hacker News
๐ŸžGDB
Flag this post
Patterns for Defensive Programming in Rust
corrode.devยท2dยท
๐Ÿฆ€Rust
Flag this post
How much disorder is there in a descending run?
morwenn.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
Show HN: An AI that keeps your internal documentation alive
davia.aiยท20hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
Writing a Data Science Book with Quarto (Using Jupyter Notebooks or Pandoc)
blog.stephenturner.usยท6hยท
Discuss: Hacker News
๐Ÿš€JIT Compilation
Flag this post
Annotated Disassembly of NES Super Contra ROM
old.reddit.comยท3dยท
๐Ÿ”Reverse Engineering
Flag this post
Show HN: I built an AI that generates full-stack apps in 30 seconds
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Product Designer's workflow for prototyping with Cursor
hvpandya.comยท2dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท22hยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
The Learning Loop and LLMs
martinfowler.comยท2hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post