Show HN: KeyLeak Detector โ€“ Scan websites for exposed API keys and secrets
github.comยท16hยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Best Digital Marketing Institute in Allahabad โ€“ Ndmit Prayagraj
ndmit.comยท9hยท
Discuss: Hacker News
๐Ÿง Neural Networks
Flag this post
Viruses of the Mind
grokipedia.comยท2hยท
Discuss: Hacker News
๐Ÿค–ai
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.comยท4dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Mitre ATT&CK v18 released
medium.comยท11hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.comยท2hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Vibecoding my way to a crit on GitHub
furbreeze.github.ioยท5hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.techยท3dยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท2dยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
From hours to seconds: AI tools to detect animal calls
seangoedecke.comยท8hยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Speedrunning an RL Environment
sidb.inยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท2dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
AI scrapers request commented scripts
cryptography.dogยท1dยท
๐Ÿ›Fuzzing
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท15hยท
๐Ÿฆ€Rust
Flag this post
BYOD security solutions explained
proton.meยท2dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Our newest model: Chandra (OCR)
datalab.toยท6hยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
How I Use Every Claude Code Feature
blog.sshh.ioยท15hยท
๐Ÿฆ€Rust
Flag this post
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
bleepingcomputer.comยท23hยท
๐Ÿ”’security
Flag this post