Show HN: KeyLeak Detector โ Scan websites for exposed API keys and secrets
๐Ghidra
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
๐Fuzzing
Flag this post
AWK technical notes (2023)
๐Fuzzing
Flag this post
Reflections on Trusting Trust (1984)
๐ฆRust
Flag this post
Mitre ATT&CK v18 released
๐Hardware Security
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
๐security
Flag this post
Viruses of the Mind
๐คai
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
๐ปRootkits
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
๐ปRootkits
Flag this post
Vibecoding my way to a crit on GitHub
๐ฆRust
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
โฑ๏ธCycle Accuracy
Flag this post
Can-t stop till you get enough
๐ฆRust
Flag this post
D.J. Bernstein: The Good News Archive
๐security
Flag this post
Loading...Loading more...