frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

EchoJEPA: Latent Predictive Foundation Model for Echocardiography

https://github.com/bowang-lab/EchoJEPA
1•euvin•3m ago•0 comments

Disablling Go Telemetry

https://go.dev/doc/telemetry
1•1vuio0pswjnm7•5m ago•0 comments

Effective Nihilism

https://www.effectivenihilism.org/
1•abetusk•8m ago•1 comments

The UK government didn't want you to see this report on ecosystem collapse

https://www.theguardian.com/commentisfree/2026/jan/27/uk-government-report-ecosystem-collapse-foi...
2•pabs3•10m ago•0 comments

No 10 blocks report on impact of rainforest collapse on food prices

https://www.thetimes.com/uk/environment/article/no-10-blocks-report-on-impact-of-rainforest-colla...
1•pabs3•10m ago•0 comments

Seedance 2.0 Is Coming

https://seedance-2.app/
1•Jenny249•12m ago•0 comments

Show HN: Fitspire – a simple 5-minute workout app for busy people (iOS)

https://apps.apple.com/us/app/fitspire-5-minute-workout/id6758784938
1•devavinoth12•12m ago•0 comments

Dexterous robotic hands: 2009 – 2014 – 2025

https://old.reddit.com/r/robotics/comments/1qp7z15/dexterous_robotic_hands_2009_2014_2025/
1•gmays•16m ago•0 comments

Interop 2025: A Year of Convergence

https://webkit.org/blog/17808/interop-2025-review/
1•ksec•26m ago•1 comments

JobArena – Human Intuition vs. Artificial Intelligence

https://www.jobarena.ai/
1•84634E1A607A•29m ago•0 comments

Concept Artists Say Generative AI References Only Make Their Jobs Harder

https://thisweekinvideogames.com/feature/concept-artists-in-games-say-generative-ai-references-on...
1•KittenInABox•33m ago•0 comments

Show HN: PaySentry – Open-source control plane for AI agent payments

https://github.com/mkmkkkkk/paysentry
1•mkyang•35m ago•0 comments

Show HN: Moli P2P – An ephemeral, serverless image gallery (Rust and WebRTC)

https://moli-green.is/
1•ShinyaKoyano•45m ago•0 comments

The Crumbling Workflow Moat: Aggregation Theory's Final Chapter

https://twitter.com/nicbstme/status/2019149771706102022
1•SubiculumCode•49m ago•0 comments

Pax Historia – User and AI powered gaming platform

https://www.ycombinator.com/launches/PMu-pax-historia-user-ai-powered-gaming-platform
2•Osiris30•50m ago•0 comments

Show HN: I built a RAG engine to search Singaporean laws

https://github.com/adityaprasad-sudo/Explore-Singapore
1•ambitious_potat•56m ago•0 comments

Scams, Fraud, and Fake Apps: How to Protect Your Money in a Mobile-First Economy

https://blog.afrowallet.co/en_GB/tiers-app/scams-fraud-and-fake-apps-in-africa
1•jonatask•56m ago•0 comments

Porting Doom to My WebAssembly VM

https://irreducible.io/blog/porting-doom-to-wasm/
2•irreducible•56m ago•0 comments

Cognitive Style and Visual Attention in Multimodal Museum Exhibitions

https://www.mdpi.com/2075-5309/15/16/2968
1•rbanffy•58m ago•0 comments

Full-Blown Cross-Assembler in a Bash Script

https://hackaday.com/2026/02/06/full-blown-cross-assembler-in-a-bash-script/
1•grajmanu•1h ago•0 comments

Logic Puzzles: Why the Liar Is the Helpful One

https://blog.szczepan.org/blog/knights-and-knaves/
1•wasabi991011•1h ago•0 comments

Optical Combs Help Radio Telescopes Work Together

https://hackaday.com/2026/02/03/optical-combs-help-radio-telescopes-work-together/
2•toomuchtodo•1h ago•1 comments

Show HN: Myanon – fast, deterministic MySQL dump anonymizer

https://github.com/ppomes/myanon
1•pierrepomes•1h ago•0 comments

The Tao of Programming

http://www.canonical.org/~kragen/tao-of-programming.html
2•alexjplant•1h ago•0 comments

Forcing Rust: How Big Tech Lobbied the Government into a Language Mandate

https://medium.com/@ognian.milanov/forcing-rust-how-big-tech-lobbied-the-government-into-a-langua...
4•akagusu•1h ago•1 comments

PanelBench: We evaluated Cursor's Visual Editor on 89 test cases. 43 fail

https://www.tryinspector.com/blog/code-first-design-tools
2•quentinrl•1h ago•2 comments

Can You Draw Every Flag in PowerPoint? (Part 2) [video]

https://www.youtube.com/watch?v=BztF7MODsKI
1•fgclue•1h ago•0 comments

Show HN: MCP-baepsae – MCP server for iOS Simulator automation

https://github.com/oozoofrog/mcp-baepsae
1•oozoofrog•1h ago•0 comments

Make Trust Irrelevant: A Gamer's Take on Agentic AI Safety

https://github.com/Deso-PK/make-trust-irrelevant
9•DesoPK•1h ago•4 comments

Show HN: Sem – Semantic diffs and patches for Git

https://ataraxy-labs.github.io/sem/
1•rs545837•1h ago•1 comments
Open in hackernews

I got tired of juggling security tools,so I built an AI copilot to do it for me

https://www.sydsec.co.uk
2•paul2495•2mo ago

Comments

paul2495•2mo ago
Hey HN,

  As a security analyst, a typical workflow for me was a frustrating juggling act: run an Nmap scan, manually parse the output, search for CVEs, find an exploit script, set up a listener in Metasploit, and then finally launch the exploit.
I was drowning in terminal windows and context-switching, and I knew there had to be a better way.

  So, I built Syd: a desktop assistant that acts as an intelligent front-end for the security tools I use every day. My goal was to create an "analyst co-pilot" that automates the tedious parts and provides expert guidance, letting me
focus on the actual analysis. It's built in Python with a simple Tkinter GUI.

Here's a concrete example—the "Pwn a Box" workflow that Syd now streamlines:

   1. Recon: I kick off an Nmap scan directly from Syd's UI.
   2. Automated Analysis: The moment the scan finishes, Syd's own rule-based engine and local CVE database parse thenresults. It automatically identifies a service (e.g., "vsftpd 2.3.4") and finds it's vulnerable, recommending a specific Metasploit module(exploit/unix/ftp/vsftpd_234_backdoor).
   3. Strategic Guidance: This is where the AI comes in. I can take that analysis and ask Syd, "What's the best way to approach this?" and its RAG-powered chat gives me high-level strategic advice on exploitation, post-exploitation, and privilege escalation, all based on its embedded knowledge base.
   4. Execution & C2: I then pivot to the Metasploit page within Syd. It uses a controller to connect to the Metasploit RPC server, pre-configures the recommended exploit, sets the LHOST/RHOST, and launches it. When the exploit succeeds, the new session appears right there in the UI, ready for interaction.

  What used to be 30 minutes of manual work across five different tools is now a guided, 2-minute workflow within a
  single interface.

  For security, the whole system is designed to be air-gapped (it's delivered on a physical SSD) and the AI assistance is powered by local models and a curated knowledge base, so no sensitive data ever leaves the machine. It also integrates Volatility for memory analysis, YARA for malware hunting, and more.

  The videos on my site are a bit rough, but they show some of this in action. The project is still evolving, and I'd love to get the HN community's feedback, ideas, or even contributions.

  There's a mailing list on the website if you're interested in major updates or want to be part of a future beta for a more advanced version.

  Website (with videos & mailing list): https://sydsec.co.uk/