New best story on Hacker News: Zig's New Relationship with LLVM

New best story on Hacker News: Zig's New Relationship with LLVM
Zig's New Relationship with LLVM
409 by todsacerdoti | 241 comments on Hacker News.



via Blogger https://ift.tt/346ouPl
September 29, 2020 at 05:08AM
Read more

New best story on Hacker News: How to Get Promoted

New best story on Hacker News: How to Get Promoted
How to Get Promoted
432 by thatonewhere | 182 comments on Hacker News.



via Blogger https://ift.tt/2HF7acB
September 29, 2020 at 04:08AM
Read more

New best story on Hacker News: Assange Trial Day 18

New best story on Hacker News: Assange Trial Day 18
Assange Trial Day 18
392 by AllegedAlec | 73 comments on Hacker News.



via Blogger https://ift.tt/36cSDz2
September 29, 2020 at 03:08AM
Read more

New best story on Hacker News: CRDTs are the future

New best story on Hacker News: CRDTs are the future
New best story on Hacker News: CRDTs are the future
CRDTs are the future
446 by lewisjoe | 142 comments on Hacker News.



via Blogger https://ift.tt/2EFuJRi
September 29, 2020 at 02:08AM
via Blogger https://ift.tt/2GdId7k
September 29, 2020 at 02:10AM
Read more

New best story on Hacker News: Universal Split Screen

New best story on Hacker News: Universal Split Screen
New best story on Hacker News: Universal Split Screen
Universal Split Screen
453 by surround | 56 comments on Hacker News.



via Blogger https://ift.tt/3463KqX
September 29, 2020 at 02:08AM
via Blogger https://ift.tt/2S8v6XO
September 29, 2020 at 02:10AM
Read more

New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)

New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)
New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)
Stop Asking Me to “Sign Up” (2014)
428 by jeremylevy | 265 comments on Hacker News.



via Blogger https://ift.tt/3mZB4s7
September 29, 2020 at 02:08AM
via Blogger https://ift.tt/36sopbB
September 29, 2020 at 02:10AM
Read more

New best story on Hacker News: Zig's New Relationship with LLVM

Zig's New Relationship with LLVM
409 by todsacerdoti | 241 comments on Hacker News.


Read more

New best story on Hacker News: How to Get Promoted

How to Get Promoted
432 by thatonewhere | 182 comments on Hacker News.


Read more

New best story on Hacker News: Assange Trial Day 18

Assange Trial Day 18
392 by AllegedAlec | 73 comments on Hacker News.


Read more

New best story on Hacker News: CRDTs are the future

New best story on Hacker News: CRDTs are the future
CRDTs are the future
446 by lewisjoe | 142 comments on Hacker News.



via Blogger https://ift.tt/2EFuJRi
September 29, 2020 at 02:08AM
Read more

New best story on Hacker News: Universal Split Screen

New best story on Hacker News: Universal Split Screen
Universal Split Screen
453 by surround | 56 comments on Hacker News.



via Blogger https://ift.tt/3463KqX
September 29, 2020 at 02:08AM
Read more

New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)

New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)
Stop Asking Me to “Sign Up” (2014)
428 by jeremylevy | 265 comments on Hacker News.



via Blogger https://ift.tt/3mZB4s7
September 29, 2020 at 02:08AM
Read more

New best story on Hacker News: CRDTs are the future

CRDTs are the future
446 by lewisjoe | 142 comments on Hacker News.


Read more

New best story on Hacker News: Universal Split Screen

Universal Split Screen
453 by surround | 56 comments on Hacker News.


Read more

New best story on Hacker News: Stop Asking Me to “Sign Up” (2014)

Stop Asking Me to “Sign Up” (2014)
428 by jeremylevy | 265 comments on Hacker News.


Read more

ace voip | Penetration Testing Tools

ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP corporate directory enumeration tool that mimics the behavior of an IP phone to download name and extension entries that can display a given phone on its screen interface. In the Read more…

Read more

Amap ( Application Mapping Tool Scanning )

Amap ( Application Mapping ) is designed to correlate applications that reside on a host to a specific port or port. Amap connects it to the port (s) and sends packets that will automatically respond in response. These packets typically Read more…

Read more

How to Crack Online Passwords with THC Hydra

How to Crack Online Password with Tamper Data & THC Hydra

A very fast network logon cracker with thc-hydra dictionary attack tool that supports many different services. You can use the thc-hydra tool to crack a password Many hackers love this tool due to its GUI and Cmdline interface. If you Read more…

Read more

Inshackle – Hack Instagram : Track Unfollowers, Increase Your Followers, Download Stories, Etc

hack instagram

Hack Instagram : Track unfollowers, Increase your followers, Download Stories, etc Features: Unfollow Tracker Increase Followers Download: Stories, Saved Content, Following/followers list, Profile Info Unfollow all your following Usage: git clone https://github.com/thelinuxchoice/inshackle cd inshackle bash inshackle.sh Author: github.com/thelinuxchoice/inshackle Download Inshackle Readmore

Read more

Powershell-RAT – Python Based Backdoor That Uses Gmail To Exfiltrate Data Through Attachment

rat

Python based backdoor which uses Gmail to eject data through attachments. This RAT will help during the Red Team’s engagement to the rear of any Windows machines. It tracks user activity using screen capture and sends it to an attacker Read more…

Read more