Merlin’s Evolution: Multi-Operator CLI and Peer-to-Peer Magic

Merlin’s Evolution: Multi-Operator CLI and Peer-to-Peer Magic

Image Generated by https://hotpot.ai/art-generatorOver the past year, I’ve been working on making significant updates to Merlin in my free time. Today, I’m ready to release version 2 of Merlin. Some of the ...
👀

Avoid libwebp Electron Woes On macOS With positron

If you’ve got 👀 on this blog (directly, or via syndication) you’d have to have been living under a rock to not know about the libwebp supply chain disaster. An unfortunate casualty ...
Shaft Silhouette with Can You Dig It below

“Bizarre” DNS Hacks For Fun And, Um…, Fun

| | dns, Go, golang, hacks
I’ve been (slowly) making my way through FOSDEM `23 presentations and caught up to Peter Lowe‘s “Bizarre and Unusual Uses of DNS • Rule 53: If you can think of it, someone’s ...
🐘

Honk If You Like The Fediverse!

| | fediverse, Go, golang, mastodon
This is a re-post from today’s newsletter. I generally avoid doing this but the content here is def more “bloggy” than “newslettery”. You can now receive these blog posts in your activity ...
Introducing BloodHound 4.2 — The Azure Refactor

Introducing BloodHound 4.2 — The Azure Refactor

Introducing BloodHound 4.2 — The Azure RefactorThe BloodHound Enterprise team is proud to announce the release of BloodHound 4.2 — The Azure Refactor.The primary authors of BloodHound 4.2 are Dillon Lees (@ddlees), Rohan Vazarkar (@CptJesus), Ulises Rangel ...
💙

A WeatherFlow Tempest UDP Broadcast Receiver in Golang, Rust, Swift, and C++

| | C++, Go, golang, rust, SWIFT
After a Twitter convo about weather stations I picked up a WeatherFlow Tempest. Setup was quick, but the sensor package died within 24 hours. I was going to give up on it ...

Eureka! How Pulumi Brought Sanity to Our DevOps Team

I started out my professional career as a software developer then became a DevOps engineer. (Get it? It’s a joke.) The irony is that DevOps is not an engineering discipline at all, ...
Unfurling Hemlock malware

Behavior-Based Detection Can Stop Exotic Malware

To stay a step ahead of cyber defenders, malware authors are using “exotic” programming languages—such as Go (Golang), Rust, Nim and Dlang—to evade detection and impede reverse engineering efforts. Unconventional languages are ...
Security Boulevard
picture of a Go profiling graph showing CPU usage on a per-method basis

An Optimisation Story: Building a Code Scanner for Large Golang Apps

This post will shed some light on how we were able to optimise one of our frontends, reducing the typical project’s run time by half. We’ll also take a look at some ...