// LATEST
Cybersecurity
Hakrawler: The Unix Philosophy Applied to Web Reconnaissance
Developer Tools
Marqo: The Deprecated AI-Native Ecommerce Search Engine You Should Know About (But Not Use)
AI Dev Tools
AugLy: How Meta Trains Models to Survive the Internet's Chaos
AI Agents
Inngest: The Workflow Engine That Runs Functions on Your Infrastructure, Not Theirs
Developer Tools
01: Building the Open-Source Answer to Rabbit R1's Voice-Controlled Computer
Cybersecurity
Testing LLM Agents Before They Hallucinate in Production: Inside Giskard's Component-Level Evaluation
Cybersecurity
KingOfBugBountyTips: The Bug Hunter's Command Arsenal That's Not Actually Software
Developer Tools
How Dangerzone Weaponizes Pixels to Destroy Document-Based Exploits
Developer Tools
SynthWave '84: How a VS Code Theme Hacks Core Files for Neon Glow
Developer Tools
Hyperscan: How Intel Matches Tens of Thousands of Regex Patterns Simultaneously
Cybersecurity
PMD: Building Multi-Language Static Analysis with AST Traversal and XPath Rules
Developer Tools
Inside awesome-devsecops: The Community-Curated Roadmap to Security Automation
LLM Engineering
AgentOps: The Missing Observability Layer for Production AI Agents
AI Agents
Agent Laboratory: Multi-Agent Research Automation from Literature Review to LaTeX
LLM Engineering
MosaicML Composer: PyTorch Training That Scales From 1 to 512 GPUs Without Rewriting Code
Developer Tools
Building Interactive CLI Tools in Go with go-prompt: A Deep Dive
Developer Tools
Dshell: The US Army's Network Forensics Framework for Post-Incident PCAP Analysis
Developer Tools
Inside djadmin/awesome-bug-bounty: A Curated Directory for Security Researchers
Automation
Shortest: Writing E2E Tests in Plain English with Claude AI
Cybersecurity
Can I Take Over XYZ: The Crowdsourced Database Preventing Subdomain Takeover Blind Spots
Data & Knowledge
Inside dnstwist: How a Domain Permutation Engine Catches Phishing Campaigns Before They Hook Your Users
LLM Engineering
OpenVLA: Training Robot Policies by Treating Actions as Language Tokens
AI Dev Tools
EyeWitness: How Virtual Environments Solved Python's PEP 668 Problem for Red Teams
Cybersecurity