11
2
Testing your fit for policy careers (2024) (emergingtechpolicy.org)
3
B.A.T.M.A.N Protocol Concept (2011) (open-mesh.org)
2
Canonical Huffman codes are a speed optimization not a space optimization (2023) (wareya.wordpress.com)
1
Lexing and non-lexing scanners (parsing) (wareya.wordpress.com)
3
Three Asymmetric Divisions of the Octave (1996) (wendycarlos.com)
1
Using floating point numbers as hash keys (2017) (readafterwrite.wordpress.com)
1
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point (jstrieb.github.io)
4
Notes on Waveguide Synthesis (2018) (osar.fr)
2
The SAT Game (univ-artois.fr)
4
How to Talk to Grandma About AI: Language Models as Thespians (jstrieb.github.io)
1
Language Models as Thespians (jstrieb.github.io)
1
Language Models as Thespians (jstrieb.github.io)
2
Cracking the Mondrian Code (2017) (thebeliever.net)
4
Touring the Zig-EM code-scape (2024) (openem.org)
2
Cross-Compilation Toolchains for Linux (bootlin.com)
8
Getting Started with Celtic Coins – Crude and Barbarous, or Just Different? (collectingancientcoins.co.uk)
23
Low-Cost Drone Add-Ons from China Let Anyone Turn Toys into Weapons of War (wired.com)
1
Our Friend, the Fat Face (2014) (fontsinuse.com)
1
Fast, Constrained Optimization in the Browser with SCIP (jstrieb.github.io)
3
OWASP C-Based Toolchain Hardening Cheat Sheet (owasp.org)
1
Behavioral Pitfalls When Investing (bogleheads.org)
65
FindMy Flipper – AirTag and SmartTag Emulator (github.com/matthewkukanich)
101
C Macro Reflection in Zig (jstrieb.github.io)
1
List of Evan Doorbell Recordings (phreaknet.org)
2
Fixing a Protel Payphone Part 2: Installing ExpressNet (philtel.org)
5
An Introduction to Sleep Obfuscation for Malware (2023) (dtsec.us)
43
Show HN: Allocate poker chips optimally with mixed-integer nonlinear programming (github.com/jstrieb)
2
Show HN: Optimally allocate poker chips using constrained optimization (github.com/jstrieb)
1
Adapting nnue-PyTorch's binary position format for Lichess (lichess.org)
5
The Greatest CSS Tricks (Volume 1) (css-tricks.com)
18
Church's λ-Calculus (2023) [pdf] (cmu.edu)
1
Basic building blocks of dependent type theory (2022) (lesswrong.com)
1
Intel Compiler Intrinsics Guide (intel.com)
1
Theory of beauty and low-complexity art (2010) (idsia.ch)
1
EntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543) (2022) (willsroot.io)
4
An Explanation of the Double-Dabble Bin-BCD Conversion Algorithm (2004) (classiccmp.org)
2
Platform for Architecture-Neutral Dynamic Analysis (PANDA) (github.com/panda-re)
6
A lot of toast, with a side-order of roast (2002) [pdf] (upenn.edu)
1
Rigging elections with integer linear programming (2017) (drmaciver.com)
1
Wikipedia Reputation and the Wemedia Project (2004) (corante.com)
1
An Integer Overflow Puzzle (2019) (irkenkitties.com)
21
Show HN: Just.sh – compiler that turns Justfiles into portable shell scripts (github.com/jstrieb)
3
Piagios: A tool for matching and diffing source code directly against binaries (github.com/joxeankoret)
2
Raspberry Robin's Roshtyak: A Little Lesson in Trickery (2022) (avast.io)
3
GraphScape: Modeling Similarity and Sequence Among Charts (2017) (medium.com/hci-design-at-uw)
1
Destination-Passing Style (fitzgibbon.ie)
1
Diff Docker Containers (github.com/googlecontainertools)
9
Locks and Security (2005) (mattblaze.org)
1
Show HN: A cursed bash web application that makes more cursed bash web apps (github.com/jstrieb)
27
Show HN: Transform any website or eBook into a research paper (no LLM required) (github.com/jstrieb)
80
Show HN: Tetris, but the blocks are ARM instructions that execute in the browser (ofrak.com)
28
Semiconductor Supply Chain Explorer (2022) (eto.tech)
27
Self-modifying code using GCC (2011) (nikmav.blogspot.com)
10
The Design and Implementation of Userland Exec (2014) (grugq.github.io)
2
Self-modifying code using GCC (2011) (nikmav.blogspot.com)
2
The Design and Implementation of Userland Exec (grugq.github.io)
2
Semiconductor Supply Chain Explorer (eto.tech)
65
The power of keeping a coding journal (2014) (thomasburette.com)
1
JSDetox: A JavaScript malware analysis tool (relentless-coding.org)
1
Show HN: Modify and repack firmware from your browser with OFRAK (github.com/jstrieb)
1
Introduction to the Tigress C Obfuscator (tigress.wtf)
0
Wikipedia's Tips for Using the Wayback Machine (wikipedia.org)
2
Python Sorted Containers Performance at Scale (grantjenks.com)
2
Exploring OFRAK's Minimap View (redballoonsecurity.com)
1
Baets by Der (redballoonsecurity.com)
2
Introduction to Supercomputing (2016)
1
Mathematical Foundations of Joy (2002)
1