Wow, I was expecting some stickers and look what I’ve got from @ThinkstCanary 🤩
Thanks for the gifts @haroonmeer and team, you rock 💚
=> More informations about this toot | View the thread
My #MicrosoftMVR swag from @msftsecresponse has arrived! Love the reference ❤️
=> More informations about this toot | View the thread
That’s it, our short tour of my favorite resources for #LearningRust is finished… It’s now time to start your own project or pick up an open source project you like and contribute to it!
Stay tuned to the @hnsec blog for the third installment of our #OffensiveRust series, in which I’ll explore how to use #Rust for vulnerability research and present my humble contributions to @binarly_io idalib bindings, enabling the development in idiomatic Rust of standalone tools based on Hex-Rays’s IDA Pro.
https://security.humanativaspa.it/tag/rust/
=> More informations about this toot | View the thread
As an intermediate-level #Rust developer, what you need are learning resources that can help bring your skills to the next level.
One such resource is “Zero to Production in Rust” by @algo_luca, an introduction to web API backend development that provides excellent coverage of the whole language and its patterns, using a realistic project as a practical example for #LearningRust.
https://www.zero2prod.com/
Other intermediate-level learning resources that I recommend are “Effective Rust”, “Rust Design Patterns”, “Rust API Guidelines”, and the “Rust Cookbook”.
=> More informations about this toot | View the thread
Happy new year!
If you have followed my previous advice while #LearningRust, you should be ready for one of my favorite learning resources.
“Learn Rust With Entirely Too Many Linked Lists” is a fun and entertaining read on the intricacies of #Rust (and linked lists) by the same author of the eldritch Rustonomicon. You’re welcome!
https://rust-unofficial.github.io/too-many-lists/
=> More informations about this toot | View the thread
Now that you have learned the basics of the language and have set up your IDE, you’re ready to tackle some practical exercises as the next step in #LearningRust.
I especially recommend Rustlings, a collection of small exercises to get you used to reading and writing #Rust code.
https://github.com/rust-lang/rustlings/
If you need more, 100 Exercises To Learn Rust is another excellent resource for some additional guided practice. Then, you also have Exercism, Advent of Code, and similar challenges to further hone your skills.
=> More informations about this toot | View the thread
Theory is important, but I’m a strong believer in getting your hands dirty (i.e., writing your own code) as soon as possible! To make this a pleasant experience when #LearningRust, you should pick up the IDE that is best for you.
After some experimentation, I settled with RustRover by @jetbrains. It offers a delightful user experience and it’s free for non-commercial use. You should check it out.
Another popular choice is Visual Studio Code equipped with rust-analyzer and other specialized extensions such as Even Better TOML and Prettier Rust.
https://www.jetbrains.com/rust/
=> More informations about this toot | View the thread
If you aren’t familiar with how computers work under the hood, I recommend to start #LearningRust with Rust in Action, a perfect book for beginners.
It’s a hands-on guide that introduces the #Rust programming language by exploring systems programming concepts and techniques. It goes beyond language syntax to showcase what Rust has to offer in real-world use cases, such as dealing with persistent storage, memory, networking, CPU instructions, and more.
https://www.manning.com/books/rust-in-action
=> More informations about this toot | View the thread
Let’s get our journey started with the best book for #LearningRust dedicated to beginners that I’ve found out there.
Programming Rust 2nd Edition is, in my opinion, even better than the official Rust Book. It covers all you need to know (and then some) to get familiar with the #Rust programming language, in a very readable style from start to finish.
https://www.oreilly.com/library/view/programming-rust-2nd/9781492052586/
=> More informations about this toot | View the thread
Safe #Rust AIN'T SAFE!? (cve-rs explainer)
https://youtu.be/vfMpIsJwpjU
=> More informations about this toot | View the thread
2025 is just around the corner. If #LearningRust is among your New Year’s resolutions, I’ve got you.
Following my ongoing #Rust series on the @hnsec blog (https://security.humanativaspa.it/tag/rust/) and adding something along the way, in the next days I’ll recommend the learning resources that worked for me.
Stay tuned!
=> More informations about this toot | View the thread
Announcing #CodeQL Community Packs
https://github.blog/security/vulnerability-research/announcing-codeql-community-packs/
=> More informations about this toot | View the thread
Type-based #Rust #cheatsheet 🔥
https://upsuper.github.io/rust-cheatsheet/
=> More informations about this toot | View the thread
Cool network #fuzzing tool
https://github.com/claesmnyberg/netfuzz
=> More informations about this toot | View the thread
Writing down (and searching through) every #UUID 😆
https://eieio.games/blog/writing-down-every-uuid/
https://everyuuid.com/
=> More informations about this toot | View the thread
Pure gold 🏆
"When you go too far up, abstraction-wise, you run out of oxygen. Sometimes smart thinkers just don’t know when to stop, and they create these absurd, all-encompassing, high-level pictures of the universe that are all good and fine, but don’t actually mean anything at all."
https://www.joelonsoftware.com/2001/04/21/dont-let-architecture-astronauts-scare-you/
=> More informations about this toot | View the thread
The #xCyclopedia project attempts to document all executable #binaries (and eventually scripts) that reside on a typical operating system.
It provides a web page to view the data as well as a machine-readable format (JSON and CSV) that can be immediately usable in other systems such as SIEMs to enrich observed executions with contextual data.
https://strontic.github.io/xcyclopedia/intro.html
=> More informations about this toot | View the thread
Another cool #Rust project!
"Binsider offers powerful static and dynamic analysis tools, similar to readelf(1) and strace(1). It lets you inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly TUI."
https://binsider.dev/
=> More informations about this toot | View the thread
Never! 🤣🤣🤣
https://mastodon.cloud/@slashdot/113664546133554710
=> More informations about this toot | View the thread
Oasis Security Research Team Discovers Microsoft #Azure #MFA Bypass
https://oasis.security/resources/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass
=> More informations about this toot | View the thread
=> This profile with reblog | Go to raptor@infosec.exchange account This content has been proxied by September (ba2dc).Proxy Information
text/gemini