• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
No screen no controller and absolutely no sense just a power button and a USB port.
https://crastinator-pro.github.io/steam-brick/
 
games hardware maker
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
CUE
https://cuelang.org/

Configure Unify Execute Validate, define, and use dynamic and text‑based dataLearn more Get started with CUE CUE makes it easy to validate data, write schemas, …

 
open source validation
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
We will ban you and ridicule you in public if you waste our time on crap reports
https://curl.se/.well-known/security.txt
 
ai hackernews open source software
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The tough reality of being a "glue person"
https://cutlefish.substack.com/p/the-tough-reality-of-being-a-glue
 
management people
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity
https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]

 
pentest security vulnerability
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The 88x31 GIF Collection | Part 1
https://cyber.dabamos.de/88x31/
 
ad history image internet
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
A secret macOS tool – networkQuality
https://cyberhost.uk/the-hidden-macos-speedtest-tool-networkquality/

Getting Started with networkQuality

The networkQuality tool is a built-in tool released in macOS Monterey that can help diagnose network issues and measure network performance. In this post, we'll go over how to use the networkQuality tool and some of its key features.

Running the Default Tests

To access the

 
macos networking testing
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/
https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/
 
cyber phishing security
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Critical Apache HTTP Server Flaw Exposes Millions of Servers to Remote Code Execution Attacks
https://cybersecuritynews.com/apache-http-server-rce/

The Apache Software Foundation has released a critical security update for Apache HTTP Server, patching five vulnerabilities, including a dangerous double-free flaw capable of enabling Remote Code Execution (RCE) in version 2.4.67, released on May 4, 2026.

 
Added 15 hours ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/

Critical Unauthenticated RCE Flaw, no Common CVE identifiers have been assigned yet, although experts suggest there should be at least three to six.

 
cyber linux security vulnerability
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
https://cybersecuritynews.com/kali-gpt/

Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.

 
ai cyber llm pentest security
Added 10 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
METATRON - Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux
https://cybersecuritynews.com/metatron-ai-penetration-testing/

A new open-source penetration testing framework called METATRON is gaining attention in the security research community for its fully offline, AI-driven approach to vulnerability assessment.

 
ai cyber llm pentest security self-hosting
Added 4 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks
https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/

A vulnerability in the popular open-source firewall software pfSense has been identified, allowing for remote code execution (RCE) attacks.

 
pfsense security vulnerability
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code
https://cybersecuritynews.com/openssh-vulnerability-proxycommand/

A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim's machine.

 
cyber security ssh vulnerability
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
STRIDE GPT - AI-powered Tool LLMs To Generate Threat Models
https://cybersecuritynews.com/stride-gpt-ai-powered-tool/

A new tool has emerged that promises to revolutionize the way organizations approach threat modeling. STRIDE GPT, an AI-powered threat modeling tool, leverages the capabilities of large language models (LLMs) to generate comprehensive threat models

 
ai automation llm threat assessment threat model
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
D2: Diagram Scripting Language
https://d2lang.com/tour/intro/
 
code diagrams hackernews
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Test Ad Block - Toolz
https://d3ward.github.io/toolz/adblock.html

Project Archived

 
adblock security
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Dark Castle
https://darkcastle.co.uk/
 
games hackernews retro
Added 3 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://datablocks.pro/
https://datablocks.pro/
 
data data science tools
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Search for Charts by Data Visualization Functions
https://datavizcatalogue.com/search.html

The Data Visualisation Catalogue, helping you find the right data visualization method for your data

 
catalog data visualisation
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
I Quit. The Clankers Won
https://dbushell.com/2026/04/01/i-quit-the-clankers-won/

The one where I pack up my bags

 
ai blog hackernews llm writing
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Nathan Fillion Says 'Firefly' Animated Series In Development
https://deadline.com/2026/03/nathan-fillion-firefly-animated-series-development-1236754122/

Nathan Fillion says 'Firefly' animated series is in development with costars to voice their original roles. Concept art revealed.

 
movies sci fi tv
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
How to Yubikey: a configuration cheatsheet
https://debugging.works/blog/yubikey-cheatsheet/

How to use and configure a Yubikey

 
how-to mfa security yubikey
Added 11 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Introducing CodeMender: an AI agent for code security - Google DeepMind
https://deepmind.google/discover/blog/introducing-codemender-an-ai-agent-for-code-security/

CodeMender is a new AI-powered agent that improves code security automatically. It instantly patches new software vulnerabilities, and rewrites and secures existing code, eliminating entire...

 
application security cyber llm security
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 11
  • 12
  • 13
  • ...
  • 74
  • 75
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks