// LATEST
Cybersecurity
bbscope: Building a Multi-Platform Bug Bounty Scope Aggregator with PostgreSQL and LLM Normalization
Cybersecurity
Teaching AI Assistants to Hunt Bugs: Inside h1-brain's MCP Architecture
AI Dev Tools
Dyana: Sandboxed Runtime Profiling for Untrusted Machine Learning Models and Executables
AI Agents
Kiroku: Turning Paper Writers Into Advisors Using Multi-Agent Research Assistants
LLM Engineering
How a Single Vector Controls Your LLM's Refusal Behavior
AI Dev Tools
Choreographing Multiple Entities in 3D Space: Inside 3DTrajMaster's Video Generation Architecture
Cybersecurity
Open-CVDB: The Community-Driven Database Tracking Cloud Provider Security Failures
Cybersecurity
Gsec: The Open-Source Web Scanner That Automates What Burp Suite Makes You Test Manually
AI Agents
Inside the Damn Vulnerable LLM Agent: Learning to Exploit ReAct Loop Hijacking
LLM Engineering
Brainstorm: Teaching LLMs to Fuzz Web Applications Smarter Than Your Wordlist
Cybersecurity
GSAN: Mining Subdomains from SSL Certificates Without Certificate Transparency Logs
Cybersecurity
Gorilla: A Unified Wordlist Generator That Replaces Your Entire Password Cracking Toolkit
AI Agents
Building Multi-Agent AI Systems with motleycrew: A Graph-Based Orchestration Framework
AI Agents
AgentBoard: Why Your LLM Agent's 70% Success Rate Might Hide a 10% Grounding Problem
Developer Tools
Building a Custom Active Directory Password Filter: Inside OpenPasswordFilter's LSASS Integration
Cybersecurity
Second Order: Finding Subdomain Takeovers Hidden in Plain Sight
AI Agents
Choosing Your AI Agent Framework: A Side-by-Side Comparison Repository
AI Agents
Rigging: The Anti-Framework Framework for Production LLM Code
Automation
Teaching SQLMap to Think: How LLMs Turn Security Testing into a Conversation
AI Agents
Natlas: Building a Distributed Attack Surface Scanner Before ASM Was Cool
Cybersecurity
ppfuzz: Hunting Client-Side Prototype Pollution with Headless Chrome and Rust
AI Dev Tools
Why Prompt Injection Defenses Are About Damage Control, Not Prevention
Cybersecurity
Puncia: When You Need Nation-State Exploit Intelligence Your CVE Database Doesn't Have
Developer Tools