home.social

#nim — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #nim, aggregated by home.social.

  1. Unmasking a Multi-Stage Loader: AutoIt Abuse Leading to Vidar Stealer Command-and-Control Communication

    A sophisticated multi-stage infection chain was identified through proactive threat hunting, beginning with the execution of MicrosoftToolkit.exe, a commonly abused hack tool. The attack employed file masquerading techniques, renaming a .dot file to .bat format to evade detection. The malware performed process discovery and attempted to terminate security-related processes before extracting payloads using extract32.exe. An AutoIt-compiled executable (Replies.scr) functioned as a loader, processing an external encrypted payload file and establishing command-and-control communication with infrastructure associated with Vidar Stealer. The malware demonstrated advanced anti-analysis capabilities, including debugger detection and instrumentation callback queries. It targeted credentials, browser data, cryptocurrency wallets, and system information. Post-execution cleanup routines deleted artifacts and terminated processes to minimize forensic evidence and evade detection, significantly complicating incident res...

    Pulse ID: 6a01c2382e61b490cfa457e4
    Pulse Link: otx.alienvault.com/pulse/6a01c
    Pulse Author: AlienVault
    Created: 2026-05-11 11:49:12

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Autoit #Browser #CyberSecurity #InfoSec #Malware #Microsoft #Nim #OTX #OpenThreatExchange #RAT #Vidar #bot #cryptocurrency #AlienVault

  2. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

    A buffer overflow vulnerability in the User-ID Authentication Portal of PAN-OS software allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. Limited exploitation has been observed starting April 9, 2026, by a likely state-sponsored threat cluster. Attackers successfully achieved remote code execution by injecting shellcode into nginx worker processes. Post-exploitation activities included deployment of EarthWorm and ReverseSocks5 tunneling tools, Active Directory enumeration using compromised firewall credentials, and systematic log destruction to evade detection. The attackers demonstrated operational discipline with intermittent interactive sessions over multiple weeks, using open-source tools instead of proprietary malware to minimize detection. The vulnerability poses elevated risk when the portal is exposed to untrusted networks or the public internet.

    Pulse ID: 69fc45baaffc99649cda5385
    Pulse Link: otx.alienvault.com/pulse/69fc4
    Pulse Author: AlienVault
    Created: 2026-05-07 07:56:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Nginx #Nim #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #ShellCode #Vulnerability #Worm #ZeroDay #bot #socks5 #AlienVault

  3. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

    A buffer overflow vulnerability in the User-ID Authentication Portal of PAN-OS software allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. Limited exploitation has been observed starting April 9, 2026, by a likely state-sponsored threat cluster. Attackers successfully achieved remote code execution by injecting shellcode into nginx worker processes. Post-exploitation activities included deployment of EarthWorm and ReverseSocks5 tunneling tools, Active Directory enumeration using compromised firewall credentials, and systematic log destruction to evade detection. The attackers demonstrated operational discipline with intermittent interactive sessions over multiple weeks, using open-source tools instead of proprietary malware to minimize detection. The vulnerability poses elevated risk when the portal is exposed to untrusted networks or the public internet.

    Pulse ID: 69fc45baaffc99649cda5385
    Pulse Link: otx.alienvault.com/pulse/69fc4
    Pulse Author: AlienVault
    Created: 2026-05-07 07:56:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Nginx #Nim #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #ShellCode #Vulnerability #Worm #ZeroDay #bot #socks5 #AlienVault

  4. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

    A buffer overflow vulnerability in the User-ID Authentication Portal of PAN-OS software allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. Limited exploitation has been observed starting April 9, 2026, by a likely state-sponsored threat cluster. Attackers successfully achieved remote code execution by injecting shellcode into nginx worker processes. Post-exploitation activities included deployment of EarthWorm and ReverseSocks5 tunneling tools, Active Directory enumeration using compromised firewall credentials, and systematic log destruction to evade detection. The attackers demonstrated operational discipline with intermittent interactive sessions over multiple weeks, using open-source tools instead of proprietary malware to minimize detection. The vulnerability poses elevated risk when the portal is exposed to untrusted networks or the public internet.

    Pulse ID: 69fc45baaffc99649cda5385
    Pulse Link: otx.alienvault.com/pulse/69fc4
    Pulse Author: AlienVault
    Created: 2026-05-07 07:56:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Nginx #Nim #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #ShellCode #Vulnerability #Worm #ZeroDay #bot #socks5 #AlienVault

  5. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

    A buffer overflow vulnerability in the User-ID Authentication Portal of PAN-OS software allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. Limited exploitation has been observed starting April 9, 2026, by a likely state-sponsored threat cluster. Attackers successfully achieved remote code execution by injecting shellcode into nginx worker processes. Post-exploitation activities included deployment of EarthWorm and ReverseSocks5 tunneling tools, Active Directory enumeration using compromised firewall credentials, and systematic log destruction to evade detection. The attackers demonstrated operational discipline with intermittent interactive sessions over multiple weeks, using open-source tools instead of proprietary malware to minimize detection. The vulnerability poses elevated risk when the portal is exposed to untrusted networks or the public internet.

    Pulse ID: 69fc45baaffc99649cda5385
    Pulse Link: otx.alienvault.com/pulse/69fc4
    Pulse Author: AlienVault
    Created: 2026-05-07 07:56:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Nginx #Nim #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #ShellCode #Vulnerability #Worm #ZeroDay #bot #socks5 #AlienVault

  6. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

    A buffer overflow vulnerability in the User-ID Authentication Portal of PAN-OS software allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. Limited exploitation has been observed starting April 9, 2026, by a likely state-sponsored threat cluster. Attackers successfully achieved remote code execution by injecting shellcode into nginx worker processes. Post-exploitation activities included deployment of EarthWorm and ReverseSocks5 tunneling tools, Active Directory enumeration using compromised firewall credentials, and systematic log destruction to evade detection. The attackers demonstrated operational discipline with intermittent interactive sessions over multiple weeks, using open-source tools instead of proprietary malware to minimize detection. The vulnerability poses elevated risk when the portal is exposed to untrusted networks or the public internet.

    Pulse ID: 69fc45baaffc99649cda5385
    Pulse Link: otx.alienvault.com/pulse/69fc4
    Pulse Author: AlienVault
    Created: 2026-05-07 07:56:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Nginx #Nim #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #ShellCode #Vulnerability #Worm #ZeroDay #bot #socks5 #AlienVault

  7. Popular DAEMON Tools software compromised

    Since April 8, 2026, installers of DAEMON Tools software have been compromised with malicious payloads distributed through the legitimate website. Versions 12.5.0.2421 to 12.5.0.2434 contain trojaned binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with legitimate developer certificates. The attack has affected thousands of systems across over 100 countries, though advanced payloads were selectively deployed to approximately a dozen machines in government, scientific, manufacturing, and retail organizations. Initial infection establishes backdoor communications to typosquatted domains, followed by deployment of an information collector for system profiling. Targeted systems receive additional implants including a minimalistic backdoor and QUIC RAT. Chinese-language strings found in malicious components suggest a Chinese-speaking threat actor. The attack remains active at time of publication, demonstrating sophisticated supply chain compromise techniques comparable to the 2023 3CX ...

    Pulse ID: 69f9fd6e0328f7a1be1faa20
    Pulse Link: otx.alienvault.com/pulse/69f9f
    Pulse Author: AlienVault
    Created: 2026-05-05 14:23:42

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Chinese #CyberSecurity #Government #InfoSec #Mac #Manufacturing #Nim #OTX #OpenThreatExchange #RAT #SupplyChain #Trojan #bot #AlienVault

  8. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  9. Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

    Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

    Pulse ID: 69ea724596582ed94bc23acf
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:57

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

  10. Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

    Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

    Pulse ID: 69ea724596582ed94bc23acf
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:57

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

  11. Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

    Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

    Pulse ID: 69ea724596582ed94bc23acf
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:57

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

  12. Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

    Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

    Pulse ID: 69ea724596582ed94bc23acf
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:57

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

  13. Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

    Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

    Pulse ID: 69ea724596582ed94bc23acf
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:57

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

  14. Iranian APT Seedworm Targets Global Organizations via Microsoft Teams

    In late February 2026, following escalating Middle East tensions and coordinated military actions, Iranian APT group Seedworm launched sophisticated social engineering attacks via Microsoft Teams. Attackers impersonated IT support personnel using deceptive Microsoft 365 tenant domains to convince victims to execute malicious MSI installers. The campaign deployed a custom backdoor called Dindoor, which leveraged legitimate Deno runtime to execute obfuscated payloads in-memory, minimizing detection. The operation included multiple components for persistence, command-and-control communications, and data exfiltration. Infrastructure overlapped with previously reported MuddyWater operations. The attack demonstrates the group's evolution in using collaboration platforms as initial access vectors while combining dual-use tooling with living-off-the-land techniques to bypass traditional security controls.

    Pulse ID: 69e2417dcac9587a626c98a2
    Pulse Link: otx.alienvault.com/pulse/69e24
    Pulse Author: AlienVault
    Created: 2026-04-17 14:19:41

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #InfoSec #Iran #Microsoft #MicrosoftTeams #MiddleEast #Military #MuddyWater #Nim #OTX #OpenThreatExchange #RAT #SeedWorm #SocialEngineering #Worm #bot #AlienVault

  15. Executes the query and returns the first column of the first row of the result dataset. Returns "" if the dataset contains no rows or the database value is NULL.

    Dear NIM, WTF. Love, me.

    #NIM #WTF

  16. Just realized I was running a fairly old version of the [chawan] terminal browser, 0.1. Now yoinked the latest stuff from the git repo (0.4-dev), and it seems to fix a few things, based on a cursory glance.

    Super neat project! Terminal web browser with image (#sixel) and #CSS support!

    (Written in #Nim! cc: @sotolf)

  17. Бесплатный API для нейросетей от NVIDIA: 100+ моделей, OpenAI-совместимый эндпоинт и 40 запросов в минуту

    NVIDIA раздаёт бесплатные API-ключи к 100+ моделям: DeepSeek R1, Llama 3.3, Kimi K2.5, GLM-5 и другие. OpenAI-совместимый эндпоинт — меняешь base_url и model, всё работает. Регистрация за 2 минуты, без карты. Разбираю лимиты (40 req/min), подключение к Claude Code и OpenClaw, сравнение с OpenRouter и Groq, и зачем NVIDIA это делает.

    habr.com/ru/articles/1023592/

    #nvidia #api #llm #deepseek #бесплатно #нейросети #nim

  18. Бесплатный API для нейросетей от NVIDIA: 100+ моделей, OpenAI-совместимый эндпоинт и 40 запросов в минуту NVIDIA раздаёт б...

    #nvidia #api #llm #deepseek #бесплатно #нейросети #nim

    Origin | Interest | Match
  19. One thing these slice-of-life vlogs show is the utter banality and homogeneity of post-industrial western culture across continents.

    youtube.com/watch?v=dy2YvWEG2-k

    #Brazil #nim #SliceOfLife

  20. It's been two years trying to implement a structural equation modeling tool that runs in the gpu. It was only possible because of #nim and claude. It was fun and it works great. Infinite applications in science. The temporary site is in here: fastsem.netlify.app/

  21. Tradition up: the new, weekly development report from my #opensource projects arrived. A roguelike game, #Nim binding to Nuklear GUI library and static code analyzer for Nim got some updates. More info: www.laeran.pl.eu.org/blog/devblog... Happy Easter everyone. 🐇

  22. @simon_brooke #nim perhaps? Your lispy predilections may be piqued, provided the Python whitespace perversions don’t piss you off.

  23. 13-Mar-2026
    #AI’s #gamePlaying still has flaws: #AlphaZero-style self-play tested on #Nim
    Despite heavy training, agents show blind spots and can miss optimal moves

    eurekalert.org/news-releases/1

    #science #technology

  24. The thing i really like about Nim is that whenever I think of a convenient language affordance, that's very helpful for some particular thing, it turns out they have one of those already!  (Today I discovered they have source filters - https://nim-lang.org/docs/filters.html)

    #nim #programming

  25. @rvyhvn I really enjoyed #Nim few years ago, made my biggest project using it.
    Have you taken a look at #Raku (#rakulang) ? It’s my current fav language, I just wish that it could compile to binary (so that I can share to people now having Raku installed).

  26. And weekly wakie with the new development report from my #opensource projects. As always, a roguelike game and #Nim binding for Nuklear GUI library got some changes. More information: www.laeran.pl.eu.org/blog/devblog... And standard, happy weekend, everyone. 😃

  27. Added a new learning sample to the #kirpi framework today. This shows that small-scale platformers don’t need heavy physics engines — the collision code is just 20 lines. Enjoy. 🍻

    github.com/erayzesen/kirpi?tab

    #madewithkirpi #gamedev #nim #nimlang #platformer #programming

  28. So, 11 out of 12 days completed for #AdventofCode and my thoughts for this year:
    - `nim` is probably the language I've enjoyed coding the most in.
    - `python`'s whole ecosystem of libraries just makes things so much easier. Day 10 and `scipy` just destroyed that solution (part 2 specifically)
    - `rust` annoys me, but I 100% admit that it's a skill issue on my part.

    #nim #python #rust #programming

  29. A quick comparison using `hyperfine` for some benchmarking on the #adventofcode 2025 Day 1 solution. Not too shabby for any of the solutions, and its interesting to compare them.

    #rust #nim #python #adventofcode2025 #programming

  30. CW: Advent of Code Solution - Day 7 (Nim)

    I'm so glad I'm writing the solutions in both #nim and Python because I tend to find ways to improve the Python solution with the Nim one and vice versa. Today was one of those days. The biggest thing I learned though is that solving these damned puzzles exhausted will never lead to good things quality-wise.

    Solution: git.jamesthebard.net/jweatherl

    #aoc #aoc2025 #adventofcode #adventofcode2025 #programming #nim

  31. After numerous attempts it looks like I managed to create a maximum likelihood estimator using #Nim and #SciNim. Hopefully this is a first step to a more comprehensive estimator with non-linear constraints capabilities.

  32. CW: Advent of Code Solution - Day 6 (Nim)

    This one took a smidge more thought as I can't abuse `zip` to rotate 2D sequences. However, just rewrote the rotation as a proc and used that. Instead of `reduce`, it was all `foldl`, and I fought with `char` vs `string` due to some of the processing operations between the normal and cephalopod problem processing.

    Overall, definitely a fun solve.

    Solution: git.jamesthebard.net/jweatherl

    #aoc #aoc2025 #adventofcode #adventofcode2025 #programming #nim

  33. 🚀 #Nim #2.2.6 is here, folks! 🎉 After a grueling six months of cutting-edge #bug squashing, they've blessed us with 141 earth-shattering commits. If you're still on #Nim 1.6, congratulations on blissfully missing out on the countless "improvements" disguised as version numbers. 🙃
    nim-lang.org//blog/2025/10/31/ #release #programming #language #fixes #tech #news #HackerNews #ngated

  34. CW: ‌end of rant; some hashtags for visibility

    now for visibility i need hashtags, so if the reader'd forgive me: #a11y #accessibility #ProgrammingLanguage #XLS #Zig #ziglang #Nim #Elm #Makefile

  35. Nim is like Python on steroids. Crystal is like Ruby on steroids. Which one is suited for competitive programming involving data structures like doubly linked lists? And which language is best for multi-core parallelism? Would love to hear opinions.