Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80039
posts in
728.6
ms
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
16h
·
Discuss:
Hacker News
🌍
HTTP Servers
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
17h
·
Discuss:
Hacker News
,
r/programming
📚
Stack Allocation
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
22h
·
Discuss:
Substack
🌍
HTTP Servers
Analysis of
Hashrate-Based
Double Spending
dev.to
·
1d
·
Discuss:
DEV
🏗️
Hash Tables
Uncovering
Hidden
Informations
whiteravendev.itch.io
·
1d
🔍
Execution Tracing
SEMA
: Simple yet Effective Learning for Multi-Turn
Jailbreak
Attacks
arxiv.org
·
1d
🏷️
Memory Tagging
Pretty Printing the ART (Adaptive
Radix
Tree) in
DuckDB
artjomplaunov.github.io
·
1d
🤐
Zipper Structures
Filtered
Approximate
Nearest
Neighbor Search Cost Estimation
arxiv.org
·
1d
🔤
String Algorithms
What should I program?
jamesmcm.github.io
·
1d
🏗️
Minimal Compilers
DKnife
targets network gateways in long running
AitM
campaign
csoonline.com
·
18h
📊
Profiling
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
4d
🔗
Hash Functions
Free online
toolbox
with 50+ useful tools – no ads, no
signup
required
strongtools.site
·
2d
·
Discuss:
r/SideProject
✨
Code Formatters
About the Information System on Graph
Classes
and their
Inclusions
graphclasses.org
·
16h
🔗
Graph Rewriting
The Internet Ecosystem by
Nikesh
B.
Simmandree
payhip.com
·
21h
📮
Message Queues
AS4242420401
markround.com
·
15h
🏗️
Hash Tables
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
·
1d
·
Discuss:
Hacker News
,
Hacker News
🎯
Ring Buffers
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🛡️
Security Type Systems
ByteDance
Seed
seed.bytedance.com
·
21h
🗺️
Region Polymorphism
How many
known
passwords
do you have?
discuss.privacyguides.net
·
2d
🔗
Hash Functions
Mojo
Jojo CTF OSINT Serial Killer chain
writeups
medium.com
·
1d
🔤
Regex Engines
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help