🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ›£οΈ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Tailscale and RustDesk: Secure Remote Access to All Your Desktops
tailscale.comΒ·12h
πŸ”ŒOperating system internals
Why Simplicity Is Good for Security
fastly.comΒ·1d
🌐DNS Security
AiLock ransomware: What you need to know
fortra.comΒ·1d
🎫Kerberos Attacks
[RIDGELINE] Overtourism in Japan, and How it Hurts Small Businesses
craigmod.comΒ·1d
🌍Cultural Algorithms
Maximizing Leverage in Software Systems
bencornia.comΒ·4d
🌊Streaming Systems
Oligo Security strives to fill application-layer gaps in MITRE ATT&CK framework
cyberscoop.comΒ·2d
πŸ•΅οΈPenetration Testing
Reverse Engineering the Firmware Loader for an X-Rite Spectrophotometer
adam.zeloof.xyzΒ·9hΒ·
Discuss: Hacker News
⚑Circuit Archaeology
I’m BGOD, Starting My Tech Journey From Scratch β€” Watch Me Build
dev.toΒ·1dΒ·
Discuss: DEV
πŸš€Indie Hacking
Degradation-Agnostic Statistical Facial Feature Transformation for Blind Face Restoration in Adverse Weather Conditions
arxiv.orgΒ·5h
πŸ“ŠLearned Metrics
advice for first time up camera setup
reddit.comΒ·11hΒ·
Discuss: r/homelab
🏠Home Automation
Detecting and Mitigating Reward Hacking in Reinforcement Learning Systems: A Comprehensive Empirical Study
arxiv.orgΒ·2d
🎯Threat Hunting
The Rabbit Hole of Choosing your HomeLab parts.
reddit.comΒ·16hΒ·
Discuss: r/homelab
🏠HomeLab
Graph Diffusion-Based AeBS Deployment and Resource Allocation for RSMA-Enabled URLLC Low-Altitude Economy Networks
arxiv.orgΒ·3d
πŸ•ΈοΈNetwork Topology
Solving the Constrained Random Disambiguation Path Problem via Lagrangian Relaxation and Graph Reduction
arxiv.orgΒ·1d
🎯Performance Proofs
Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel
theregister.comΒ·2d
🎫Kerberos Attacks
Optimizing Cognitive Networks: Reinforcement Learning Meets Energy Harvesting Over Cascaded Channels
arxiv.orgΒ·1d
🌊Stream Ciphers
Adversarial Defenses via Vector Quantization
arxiv.orgΒ·5h
πŸ“ŠVector Quantization
Crunching The News For Fun And Little Profit
hackaday.comΒ·1d
πŸ“°RSS Archaeology
AI Agent Smart Contract Exploit Generation
arxiv.orgΒ·2d
πŸ§ͺProtocol Fuzzing
Here’s what I learned after solving 5 Path Traversal Labs.
infosecwriteups.comΒ·3d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap