![Show HN: COBOL-REKT, a toolkit for analysing and reverse-engineering COBOL](https://www.cdn5.niftycent.com/d/D/v/v/8/5/a/show-hn-cobol-rekt-a-toolkit-for-analysing-and-reverse-engineering-cobol.webp)
This is an evolving toolkit of capabilities helpful for analysing and reverse engineering legacy Cobol code. Currently, the following capabilities are available:
- Program / Section-level flowchart generation based on AST (SVG or PNG) - Parse Tree generation (with export to JSON) - Control Flow Tree generation (with export to JSON) - Allows embedding code comments as comment nodes in the graph - The SMOJOL Interpreter (WIP) - Injecting AST and Control Flow into Neo4J - Injecting Cobol data
![Show HN: High-precision date/time in SQLite](https://www.cdn5.niftycent.com/d/D/3/W/y/n/o/show-hn-high-precision-date-time-in-sqlite.webp)
Article URL: https://antonz.org/sqlean-time/
Comments URL: https://news.ycombinator.com/item?id=41254740
Points: 39
# Comments: 0
![Ego (YC W24, Gaming) Is Hiring Community Manager/Social Media Marketer](https://www.cdn5.niftycent.com/d/1/R/r/B/3/5/ego-yc-w24-gaming-is-hiring-community-manager-social-media-marketer.webp)
Article URL: https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/
Comments URL: https://news.ycombinator.com/item?id=41254094
Points: 12
# Comments: 3
https://www.latacora.com/blog/2024/07/29/crypto-right-answers-pq/
Article URL: https://jonathanolson.net/exact-polygonal-filtering
Comments URL: https://news.ycombinator.com/item?id=41253461
Points: 42
# Comments: 4
Article URL: https://www.sheaff-ephemera.com/list/artistic_printing.html
Comments URL: https://news.ycombinator.com/item?id=41253204
Points: 5
# Comments: 0
![MIT researchers use large language models to flag problems in complex systems](https://www.cdn5.niftycent.com/d/D/P/d/G/0/B/mit-researchers-use-large-language-models-to-flag-problems-in-complex-systems.webp)
Article URL: https://news.mit.edu/2024/researchers-use-large-language-models-to-flag-problems-0814
Comments URL: https://news.ycombinator.com/item?id=41253544
Points: 12
# Comments: 0
https://news.mit.edu/2024/researchers-use-large-language-models-to-flag-problems-0814
![Patrol the pool with this Arduino Nano-powered DIY RC submarine](https://www.cdn5.niftycent.com/d/e/a/a/Y/x/r/patrol-the-pool-with-this-arduino-nano-powered-diy-rc-submarine.webp)
Article URL: https://www.instructables.com/Diy-Rc-Submarine/
Comments URL: https://news.ycombinator.com/item?id=41249212
Points: 38
# Comments: 13
![Show HN: Browser-based XSS scanner](https://www.cdn5.niftycent.com/d/e/b/9/7/x/j/show-hn-browser-based-xss-scanner.webp)
This is a simple single-file python program that can find basic XSS (cross-site scripting) vulnerabilities in a target url. Most XSS discovery tools use a payload refelection strategy in which payloads are injected in url parameters and the GET response is inspected for places where the payload content is reflected. This is a very low precision XSS detection strategy because most reflection does not support execution.
This program uses a different approach, and instead opens the target url