Tags
- afl++ (3)
- appsec (3)
- architecture (3)
- arm64 (1)
- artificial-intelligence (1)
- asset-management (1)
- attack-surface-approaximation (1)
- automatic-exploit-generation (1)
- awesome (1)
- backdoor-attacks (1)
- binary-analysis (1)
- book-summary (2)
- code-querying (1)
- coverage (1)
- crash-reporting (1)
- cvss (1)
- dataset (1)
- defcamp (1)
- defcon (1)
- dependency-scanning (1)
- development (1)
- docker (1)
- dynamic-binary-instrumentation (1)
- email (1)
- federated-learning (1)
- firebase (1)
- flawfinder (1)
- forensics (1)
- fuzzing (4)
- gcp (1)
- gdb (1)
- gitleaks (1)
- latex (1)
- linting (1)
- linux (1)
- machine-learning (2)
- malware-analysis (1)
- monitoring (1)
- network-security (1)
- ngrok (1)
- open-source (10)
- osv-scanner (1)
- owasp-threat-tragon (1)
- podcast (6)
- principles (1)
- product (1)
- productivity (1)
- pypi (1)
- python (3)
- qbdi (1)
- research (6)
- romanian-army (1)
- scale (1)
- secret-scanning (1)
- semgrep (2)
- sentry (1)
- software-development (1)
- software-testing (1)
- ssh (1)
- startup (2)
- status-update (6)
- study-case (1)
- symbolic-execution (1)
- threat-modelling (2)
- twitter (1)
- ubuntu (2)
- ubuntu-summit (2)
- vulnerability-discovery (4)
- vulnerability-management (1)
- walkthrough (5)