home.social

#lua — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #lua, aggregated by home.social.

  1. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  2. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  3. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  4. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  5. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  6. By far my biggest joy in software development even after 30+ years is when you discover and build some simple, elegant foundations that you just keep getting leverage out of. On and on and on. Gifts that keep on giving.

    For #SilverBullet: Space #Lua (and its integrated query language), the object model and index, “truth is in the markdown”, and building everything as a platform (API) first.

    After years of investment I’m now layering more user-friendly layers on top (UIs, CLIs and such) and it’s easy, because it’s not a hack.

  7. AI-Assisted Lure Factory Targets Developers & Gamers

    A large-scale malware campaign tracked as TroyDen's Lure Factory has been identified distributing LuaJIT-based infostealers through over 300 delivery packages hosted on GitHub. The operation uses AI-generated lure names incorporating obscure biological taxonomy and medical terminology to target developers, gamers, Roblox players, and crypto users. The malware employs a two-component design with a renamed LuaJIT runtime and encrypted Lua payload that evades sandbox detection through anti-analysis checks and extreme sleep delays. Upon execution, it disables proxy detection, captures desktop screenshots, performs geolocation, and exfiltrates data to C2 servers in Frankfurt. The infrastructure demonstrates scalability with multiple IP addresses serving identical encrypted commands, while maintaining simultaneous campaigns across gaming cheats, developer tools, phone trackers, and VPN crackers.

    Pulse ID: 69fdc9a2b94badfe5abacbcb
    Pulse Link: otx.alienvault.com/pulse/69fdc
    Pulse Author: AlienVault
    Created: 2026-05-08 11:31:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #GitHub #InfoSec #InfoStealer #LUA #Malware #OTX #OpenThreatExchange #Proxy #RAT #VPN #bot #developers #AlienVault

  8. AI-Assisted Lure Factory Targets Developers & Gamers

    A large-scale malware campaign tracked as TroyDen's Lure Factory has been identified distributing LuaJIT-based infostealers through over 300 delivery packages hosted on GitHub. The operation uses AI-generated lure names incorporating obscure biological taxonomy and medical terminology to target developers, gamers, Roblox players, and crypto users. The malware employs a two-component design with a renamed LuaJIT runtime and encrypted Lua payload that evades sandbox detection through anti-analysis checks and extreme sleep delays. Upon execution, it disables proxy detection, captures desktop screenshots, performs geolocation, and exfiltrates data to C2 servers in Frankfurt. The infrastructure demonstrates scalability with multiple IP addresses serving identical encrypted commands, while maintaining simultaneous campaigns across gaming cheats, developer tools, phone trackers, and VPN crackers.

    Pulse ID: 69fdc9a2b94badfe5abacbcb
    Pulse Link: otx.alienvault.com/pulse/69fdc
    Pulse Author: AlienVault
    Created: 2026-05-08 11:31:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #GitHub #InfoSec #InfoStealer #LUA #Malware #OTX #OpenThreatExchange #Proxy #RAT #VPN #bot #developers #AlienVault

  9. AI-Assisted Lure Factory Targets Developers & Gamers

    A large-scale malware campaign tracked as TroyDen's Lure Factory has been identified distributing LuaJIT-based infostealers through over 300 delivery packages hosted on GitHub. The operation uses AI-generated lure names incorporating obscure biological taxonomy and medical terminology to target developers, gamers, Roblox players, and crypto users. The malware employs a two-component design with a renamed LuaJIT runtime and encrypted Lua payload that evades sandbox detection through anti-analysis checks and extreme sleep delays. Upon execution, it disables proxy detection, captures desktop screenshots, performs geolocation, and exfiltrates data to C2 servers in Frankfurt. The infrastructure demonstrates scalability with multiple IP addresses serving identical encrypted commands, while maintaining simultaneous campaigns across gaming cheats, developer tools, phone trackers, and VPN crackers.

    Pulse ID: 69fdc9a2b94badfe5abacbcb
    Pulse Link: otx.alienvault.com/pulse/69fdc
    Pulse Author: AlienVault
    Created: 2026-05-08 11:31:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #GitHub #InfoSec #InfoStealer #LUA #Malware #OTX #OpenThreatExchange #Proxy #RAT #VPN #bot #developers #AlienVault

  10. AI-Assisted Lure Factory Targets Developers & Gamers

    A large-scale malware campaign tracked as TroyDen's Lure Factory has been identified distributing LuaJIT-based infostealers through over 300 delivery packages hosted on GitHub. The operation uses AI-generated lure names incorporating obscure biological taxonomy and medical terminology to target developers, gamers, Roblox players, and crypto users. The malware employs a two-component design with a renamed LuaJIT runtime and encrypted Lua payload that evades sandbox detection through anti-analysis checks and extreme sleep delays. Upon execution, it disables proxy detection, captures desktop screenshots, performs geolocation, and exfiltrates data to C2 servers in Frankfurt. The infrastructure demonstrates scalability with multiple IP addresses serving identical encrypted commands, while maintaining simultaneous campaigns across gaming cheats, developer tools, phone trackers, and VPN crackers.

    Pulse ID: 69fdc9a2b94badfe5abacbcb
    Pulse Link: otx.alienvault.com/pulse/69fdc
    Pulse Author: AlienVault
    Created: 2026-05-08 11:31:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #GitHub #InfoSec #InfoStealer #LUA #Malware #OTX #OpenThreatExchange #Proxy #RAT #VPN #bot #developers #AlienVault

  11. AI-Assisted Lure Factory Targets Developers & Gamers

    A large-scale malware campaign tracked as TroyDen's Lure Factory has been identified distributing LuaJIT-based infostealers through over 300 delivery packages hosted on GitHub. The operation uses AI-generated lure names incorporating obscure biological taxonomy and medical terminology to target developers, gamers, Roblox players, and crypto users. The malware employs a two-component design with a renamed LuaJIT runtime and encrypted Lua payload that evades sandbox detection through anti-analysis checks and extreme sleep delays. Upon execution, it disables proxy detection, captures desktop screenshots, performs geolocation, and exfiltrates data to C2 servers in Frankfurt. The infrastructure demonstrates scalability with multiple IP addresses serving identical encrypted commands, while maintaining simultaneous campaigns across gaming cheats, developer tools, phone trackers, and VPN crackers.

    Pulse ID: 69fdc9a2b94badfe5abacbcb
    Pulse Link: otx.alienvault.com/pulse/69fdc
    Pulse Author: AlienVault
    Created: 2026-05-08 11:31:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #GitHub #InfoSec #InfoStealer #LUA #Malware #OTX #OpenThreatExchange #Proxy #RAT #VPN #bot #developers #AlienVault

  12. It's starting to look like a game. I only have the 2 player function going at the moment. Next up will be putting together the CPU players.

    #picotron #lua #gamedev #pixelart #retrogaming #indiegame #SundayVibes

  13. #indiedev
    update! still having fun building backend code, and #lua is still holding up super well. i really like that it has super powerful features like coroutines and the flexibility (chaos?) of javascript.

    emmylua and annotations have been super critical for keeping things together. early investment in unit tests and automating the game loop is super paying off, small changes are easy to validate with a quick `make test`. i can run the automated game loop hundreds or thousands of times to collect data. poor tenderbones has died at least a few times.

    this super helps with the hardest part so far: figuring out formulas that are fun, fair, and interesting mechanics. more later when I actually figure it out :)

  14. tiny lua compiler: a lua compiler in a single file, that's well-documented, that was hand-crafted over several years, and made to teach you compiler/tokenizer/parser/lexer design.

    this is a crazy impressive project, and in a time when people are haphazardly slopcoding projects, is a standard to live by.

    github.com/bytexenon/Tiny-Lua-

    #programming #lua

  15. I’ve been diving into #roblox game dev with my 12 year old son. His step from outgrowing #scratch. Honestly I’m highly impressed with the thought put into Roblox as a ( #Lua based) platform. Great abstractions, very productive. Highly recommended to kids who want to progress in programming. All free (until you want to publish your games to mature audiences I think there are some rules around that).

  16. Vertical thermometer with Cairo graphics

    🌡️ What's new in v1.5.0

    This release introduces a vertical glass thermometer drawn entirely with Cairo, alongside the existing lunar phase bar.

    #Conky 🖥️🌡️ #weather #antiX #Debian #icewm #Lua #github #thermometer #CairoGraphics #HAL9000

    github.com/DrCalambre/conky-we

  17. idk if y’all remember my idea for a #Lisp where all expressions are actually #Lua -style tables, instead of linked lists like a normal Lisp. (I’m calling these expressions T-expressions btw, since they’re not quite the same thing as S-expressions, and they make Tables)

    but lately I’ve been trying to figure out a way to add symmetry between defining a variable and adding a key to a table. like here’s a table literal:

    '([key value]
      [key2 value2])
    

    and ideally I’d love to be able to reuse this concept as the way to define variables. because I want this language to have as little magic as possible and as few discrete concepts to learn as possible, and a special form like (define) would be a discrete concept that I want to get rid of. so I considered letting people do something like this:

    [variable 666]
    (print variable) ; -> 666
    

    and it would work for any nested T-expressions too:

    [variable "foo"]
    
    (do
      [variable 666]
      (print variable)) ; -> 666)
    
    (print variable) ; -> foo
    
    (print
      [variable "bar"]
      variable) ; -> bar
    

    but the main problem is that in order to resolve this, the reader would have to work in phases with the interpreter:

    (do
      [variable 666]
      (print variable)
      ; ↑ the reader only goes this far,
      ; then this gets interpreted
      [variable "foo"]
      (print variable)
      ; ↑ now the reader stops here and
      ; lets the interpreter work again
      )
    

    which intuitively seems to me like it would probably be a terrible idea. alternatively, it would be a syntax error to redefine the same {variable / table key} in the same scope, which might work well enough

    this would also mean that sending keyword arguments to a function would have to use less elegant semantics:

    ; if these are variables instead of
    ; kwargs:
    (func ['kwarg0 value0]
          ['kwarg1 value1])
    
    ; then kwargs would have to just be
    ; this, like a normal Lisp. which
    ; isn't as elegant :/
    (func :kwarg0 value0
          :kwarg1 value1)
    
    ; alternatively, you could do
    ; something like this, which is IMO
    ; a bit better
    (func [:kwarg0 value0]
          [:kwarg1 value1])
    

    but the biggest problem with this idea is that they would be absolutely terrible in any kind of deeply-nested data structure, since every single key-value declaration would also be clobbering a variable:

    [id 666]
    
    `([name "Earth Machine"]
      [element ""]
      [id 667]
      [submachine
        ([name "Earth Submachine"]
         [id ,id] ; <- oops! this is
                  ; 667, but I wanted
                  ; 666
         ))
    

    I could fix this by saying that “by convention, all variables declared in a table should start with a $“ or, “by convention, all table keys that will be used as table keys (and not as variables) should be keywords”. and the latter does sound kind of reasonable

    actually, yeah. I really really like that last option. because then you can create variables with any arbitrary scope that you want, inside of literally any T-expression that you want, without increasing the level of indentation, and you can define them pretty much anywhere, and they won’t interfere with deeply-nested data structures at all, and they won’t mess with the reader -> interpreter pipeline either! that’s actually an amazing solution, unless I’m missing some reason why it won’t work

  18. How it feels to open a repo and see .lua files.

    (Image is licensed CC0-1.0, so feel free to do whatever with it.)

    #Lua #LuaLanguage #Programming

  19. 🌕 The monolith no longer just observes. Now it measures the Earth’s warmth.

    Episode 5: The thermometer. After Initialization, Signal, Contact, and Interpretation… mercury arrives. Blue to red depending on temperature.

    -- "Just what do you think you're doing, Dave?"

    Conky weather openweathermap v1.5.0 (in development).

    🔗 GitHub: github.com/DrCalambre/conky-we

    #Conky 🖥️🌡️#Weather #antiX #Debian #icewm #Lua #GeekPoetry #Kubrick #HAL9000 🔴 👨‍🚀 #kdenlive #github

  20. ⚠️ AI-powered ransomware stopped being theory with PromptLock ESET says #PromptLock used a local OpenAI model through #Ollama to generate malicious #Lua scripts on the victim host, making each run more dynamic and harder for signature-based defenses to catch. #ransomNews #ai #ransomware

  21. I'm playing retail #Wow again. Addons broke again thanks to Blizzards restrictions.
    I tried to find replacements for an addon I was using but no avail. There was one that seemed ok with some custom combatlog parsing.
    Then I thought why not take out the logik of that addons parser and wrap it into a nice #Lua library.
    The code looks overly complex and bloated - either this is a first year graduate or #AI.
    I checked the repository, bingo it's AI. It's so hard to read AI generated code IMHO.

  22. Lua has many dialects, and I love them all ❤️
    But how to write one lua-file and target them all?
    Answer: metaprogramming

    Here's a small ~700 bytes gpp-ish metaprogramming awk script 🎉

    #lua #teal #nelua #redbean #esp32 #wasm #love2D #awk

    ps. its not limited to lua :coolcat:

    codeberg.org/coderofsalvation/

  23. Lua has many dialects, and I love them all ❤️
    But how to write one lua-file and target them all?
    Answer: metaprogramming

    Here's a small ~700 bytes gpp-ish metaprogramming awk script 🎉

    #lua #teal #nelua #redbean #esp32 #wasm #love2D #awk

    ps. its not limited to lua :coolcat:

    codeberg.org/coderofsalvation/

  24. Lua has many dialects, and I love them all ❤️
    But how to write one lua-file and target them all?
    Answer: metaprogramming

    Here's a small ~700 bytes gpp-ish metaprogramming awk script 🎉

    #lua #teal #nelua #redbean #esp32 #wasm #love2D #awk

    ps. its not limited to lua :coolcat:

    codeberg.org/coderofsalvation/

  25. Lua has many dialects, and I love them all ❤️
    But how to write one lua-file and target them all?
    Answer: metaprogramming

    Here's a small ~700 bytes gpp-ish metaprogramming awk script 🎉

    #lua #teal #nelua #redbean #esp32 #wasm #love2D #awk

    ps. its not limited to lua :coolcat:

    codeberg.org/coderofsalvation/

  26. Lua has many dialects, and I love them all ❤️
    But how to write one lua-file and target them all?
    Answer: metaprogramming

    Here's a small ~700 bytes gpp-ish metaprogramming awk script 🎉

    #lua #teal #nelua #redbean #esp32 #wasm #love2D #awk

    ps. its not limited to lua :coolcat:

    codeberg.org/coderofsalvation/

  27. Renga STDL: Армирование

    В статье Renga STDL: краткий обзор языка для расширения функциональности программы Renga мы рассказывали, что такое Renga STDL, как и почему разработчики САПР создали свой предметно-ориентированный язык. Там же мы писали о планах расширения применения этого языка для стилей армирования. Стили армирования в Renga нужны для автоматизации армирования монолитных конструкций: стен, колонн, перекрытий, фундаментов, а также усиления стен и перекрытий в местах расположения проемов. В стилях армирования пользователь, задавая параметры, получает сетки, каркасы и арматурные стержни, созданные в объекте.

    habr.com/ru/companies/ascon/ar

    #renga #lua #stdl #c++ #скрипты #моделирование #bim #cad

  28. 🌿 Mi termómetro respira en verde 💚

    RGB(0.2, 0.8, 0.2)
    cuando Río Gallegos marca 11°C

    No es el azul del frío
    ni el rojo del calor extremo.
    Es el verde del equilibrio perfecto,
    la temperatura justa
    pintada en píxeles cairo.

    Un color que susurra:
    aquí, ahora, todo está bien ✨

    #Conky #Linux #antiX #Debian #icewm #Patagonia #CairoGraphics #Lua #ColorTheory #GeekPoetry 🖥️🌡️

  29. GopherWhisper: A burrow full of malware

    ESET researchers discovered a previously undocumented China-aligned APT group named GopherWhisper that targeted a governmental entity in Mongolia. The group employs a diverse arsenal of custom tools, predominantly written in Go, including backdoors LaxGopher, RatGopher, and BoxOfFriends, along with injectors JabGopher, exfiltration tool CompactGopher, loader FriendDelivery, and C++ backdoor SSLORDoor. The threat actors abuse legitimate services including Discord, Slack, Microsoft 365 Outlook, and file.io for command and control communications and data exfiltration. Through extraction of thousands of messages from compromised Slack and Discord channels, researchers gained valuable insights into the group's internal operations and post-compromise activities. Timestamp analysis of communications indicates operators work during UTC+8 business hours, aligning with China Standard Time, supporting attribution to China-aligned actors.

    Pulse ID: 69ea2ebe8c3499b065ec22a7
    Pulse Link: otx.alienvault.com/pulse/69ea2
    Pulse Author: AlienVault
    Created: 2026-04-23 14:37:50

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #China #CyberSecurity #Discord #ESET #Government #InfoSec #LUA #Malware #Microsoft #OTX #OpenThreatExchange #Outlook #RAT #SSL #bot #AlienVault

  30. fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet

    Researchers uncovered fast16, a cyber sabotage framework from 2005 that predates Stuxnet by five years. The toolset includes fast16.sys, a kernel driver that selectively targets high-precision calculation software by patching code in memory to corrupt computational results. Combined with self-propagation mechanisms via a Lua-powered carrier module (svcmgmt.exe), the framework spreads across facilities to produce consistent inaccurate calculations. This operation represents the first documented instance of strategic cyber sabotage targeting ultra-expensive computing workloads in advanced physics, cryptographic, and nuclear research. The framework uses an embedded Lua virtual machine predating Flame by three years and appears in the ShadowBrokers leak of NSA Territorial Dispute components with the evasion signature: 'fast16 *** Nothing to see here – carry on ***'.

    Pulse ID: 69eafa1063a05bb892acea52
    Pulse Link: otx.alienvault.com/pulse/69eaf
    Pulse Author: AlienVault
    Created: 2026-04-24 05:05:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #ICS #InfoSec #LUA #Mac #NSA #OTX #OpenThreatExchange #RAT #SMS #bot #AlienVault

  31. 😂 Look, someone created a #dynamic #language called "Zef" (because why not?) and now believes they can compete with #Lua, #QuickJS, and #CPython. 🚀 Just another wild ride through "how to optimize your #hobby #project to do something totally unnecessary" land! 🛠️
    zef-lang.dev/implementation #Zef #HackerNews #ngated

  32. new .plan post: doing a computing science degree the hard way, or how Tim Cain saved the day

    want to learn how a programmer's lack of experience with a specific kind of computing science problem leads to a year-long rut in building software? i wrote about how Exigy got the ability to save and load, because I refused to take a CS course in Data Structures.

    exigy.org/plan?sort=new&#2026-

    #gamedev #programming #lua #exigy #shareware

  33. Some of my favorite software, swayimg, yazi, nvim use lua for their configurations. I've been trying to understand it consciously, rather than just copy-pasting snippets from others.

    #lua #swayimg #yazi #nvim