from my link log —
wtfis: Passive hostname, domain and IP lookup tool for non-robots.
https://github.com/pirxthepilot/wtfis
saved 2025-05-13 https://
We are excited to announce the release of Vulnerability-Lookup 2.15.0!
This version brings new features, performance improvements, and several bug fixes.
Thanks to @… for the hard work.
#vulnerability
well I managed to add the datastore and multi tenancy plumbing for lanecloud v2. Basically some custom fields and better lookups with netbox...
I'll have to do another pass on the VM registration playbook too.. but the provisioning playbook works great so far.
"Vibe coding" is one of the dumbest ideas that I've heard in a long time.
Yes, there are often reasons to use tools (such as Knuth's books) to lookup methods. And well established and tested libraries are great. (Thank you "numpy".)
But "vibe coding" just turns programmers into little more than proofreaders - proofreading complex and often boring material. That is putting the cart before the horse. (Is there a modern phrase for that adage?…
Optimizing Neural Networks with Learnable Non-Linear Activation Functions via Lookup-Based FPGA Acceleration
Mengyuan Yin, Benjamin Chen Ming Choong, Chuping Qu, Rick Siow Mong Goh, Weng-Fai Wong, Tao Luo
https://arxiv.org/abs/2508.17069
By the way, we’ve never managed to get any hashes or urls from the so-called non-profit organisations that claim to share CSAM material hashes or links for detection. We’ve come to assume we’ll never receive any, so supporting actual detection was out of reach for us.
So we decided to build it ourselves. We now provide a public onion lookup service where you can look up Tor onion addresses to check whether they’re linked to CSAM for filtering and detection.
Lookup example (non CS…
OLaPh: Optimal Language Phonemizer
Johannes Wirth
https://arxiv.org/abs/2509.20086 https://arxiv.org/pdf/2509.20086…
Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center
#sharepoint #cybersecurity #vulnerability
🔗
I love the @… Security Advisory Database because they actually preserve the data from rejected advisories including the original information and the reason for rejection.
It’s clearly much more insightful than just having a bare ID marked as "rejected."
You can easily spot this in vulnerability-lookup: