MCP to help Defenders Detection Engineer Harder and Smarter
https://github.com/MHaggis/Security-Detections-MCP
https://github.com/MHaggis/Security-Detections-MCP
GitHub
GitHub - MHaggis/Security-Detections-MCP: MCP to help Defenders Detection Engineer Harder and Smarter
MCP to help Defenders Detection Engineer Harder and Smarter - MHaggis/Security-Detections-MCP
Astra is a fuzzer written in Rust, built to explore how modern Unix-compatible fuzzers are designed internally (AFL++-style architecture, scheduling, coverage tracking, crash triage, and parallel workers). This project focuses on clarity and hackability over completeness: it’s meant to be read, modified, and extended.
https://github.com/20urc3/Astra
https://github.com/20urc3/Astra
GitHub
GitHub - 20urc3/Astra: Coverage-guided fuzzer in Rust
Coverage-guided fuzzer in Rust. Contribute to 20urc3/Astra development by creating an account on GitHub.
IDASQL exposes IDA Pro databases as SQL tables with a built-in AI agent. Ask questions in plain English. The agent writes SQL, runs queries, and explains results.
https://github.com/allthingsida/idasql
https://github.com/allthingsida/idasql
GitHub
GitHub - allthingsida/idasql: IDA SQL - Interface with IDA in SQL via live virtual tables
IDA SQL - Interface with IDA in SQL via live virtual tables - allthingsida/idasql
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025
https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025
https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025
Synacktiv
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025
Malware Analysis - Malicious MS Office files without Macros
https://www.youtube.com/watch?v=RtHHckH5IsI
https://www.youtube.com/watch?v=RtHHckH5IsI
YouTube
Malware Analysis - Malicious MS Office files without Macros
We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and External Templates. At the end I provide a checklist for analyzing office files to determine if they are clean.
Discord: https://dis…
Discord: https://dis…
Defeating Anti-Reverse Engineering: A Deep Dive into the 'Trouble' Binary
https://binary.ninja/2026/01/23/reversing-linux-anti-re.html
https://binary.ninja/2026/01/23/reversing-linux-anti-re.html
Binary Ninja
Binary Ninja - Defeating Anti-Reverse Engineering: A Deep Dive into the 'Trouble' Binary
Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.
MEDUSA is a comprehensive Static Application Security Testing (SAST) tool with 74 specialized scanners covering all major languages and platforms. It features intelligent false positive reduction and 180+ AI agent security rules for the agentic era.
https://github.com/Pantheon-Security/medusa
https://github.com/Pantheon-Security/medusa
GitHub
GitHub - Pantheon-Security/medusa: AI-first security scanner with 74+ analyzers, 180+ AI agent security rules, intelligent false…
AI-first security scanner with 74+ analyzers, 180+ AI agent security rules, intelligent false positive reduction. Supports all languages. CVE detection for React2Shell, mcp-remote RCE. - Pantheon-S...
Kimi K2.5: How to Run Locally Guide
Kimi-K2.5 is the new model by Moonshot which achieves SOTA performance in vision, coding, agentic and chat tasks.
https://unsloth.ai/docs/models/kimi-k2.5
Kimi-K2.5 is the new model by Moonshot which achieves SOTA performance in vision, coding, agentic and chat tasks.
https://unsloth.ai/docs/models/kimi-k2.5
unsloth.ai
Kimi K2.5: How to Run Locally Guide | Unsloth Documentation
Guide on running Kimi-K2.5 on your own local device!
сколько примерно весит ядро (ntoskrnl.exe) Windows 11?
Final Results
11%
1 Mb
26%
10 Mb
22%
100 Mb
25%
1 Gb
16%
300 Mb