bug-bounty512
xss283
rce131
bragging-post118
account-takeover106
google102
open-source94
authentication-bypass85
exploit85
csrf85
privilege-escalation81
facebook75
stored-xss74
microsoft72
access-control66
web-security65
cve65
ai-agents63
reflected-xss63
malware52
writeup51
input-validation51
ssrf50
sql-injection48
smart-contract48
defi48
cross-site-scripting47
privacy47
tool46
information-disclosure45
ethereum44
api-security43
phishing41
cloudflare40
web-application39
apple37
llm37
burp-suite36
automation36
opinion35
vulnerability-disclosure35
web334
dos34
html-injection33
oauth33
responsible-disclosure33
smart-contract-vulnerability33
machine-learning32
idor32
lfi31
0
2/10
tutorial
A detailed walkthrough of a custom Emacs configuration built without external packages, split into core Emacs customization and 35 self-contained Elisp modules, with architectural lessons learned over two years of maintenance.
Emacs Solo
Rahul M. Juliato
MELPA
ELPA
straight.el
use-package
Vertico
Consult
Helm
Eshell
ERC
RCIRC
Dired
icomplete
tree-sitter