🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Calico Egress Gateway: A Cost-Effective NAT for Kubernetes
tigera.io·3d
📦Container Security
OSINT = Reading the Walls: Gang Graffiti as Modern-Day Hieroglyphics
dutchosintguy.com·2d
🔎OSINT Techniques
Apple Seeks Researchers for 2026 iPhone Security Program
securityweek.com·1d·
Discuss: Hacker News
🛡️ARM TrustZone
Under the Hood of Fuzzy Search: Building a Search Engine 15 times fuzzier than Lucene
andrewjsaid.com·1d·
Discuss: Hacker News, r/programming
🎯Automata theory
Ask HN: Is standardizing on MCPs over APIs within an org an anti-pattern?
news.ycombinator.com·6h·
Discuss: Hacker News
🏷️Metadata Standards
FastCaps: A Design Methodology for Accelerating Capsule Network on Field Programmable Gate Arrays
arxiv.org·4d
🖥️Hardware Architecture
Me experience finding a job as rust developer
reddit.com·17h·
Discuss: r/rust
🦀Rust Macros
Thermoptic – HTTP proxy which cloaks requests as Chrome across all stack layers
github.com·5d·
Discuss: Hacker News
🚀Indie Hacking
How to Ruin Your Weekend: Building a DIY EDR
infosecwriteups.com·2d
🔍eBPF
Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs
darkreading.com·3d
🔓Hacking
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.
arstechnica.com·3d·
Discuss: Hacker News
🌐DNS Security
Q-SafeML: Safety Assessment of Quantum Machine Learning via Quantum Distance Metrics
arxiv.org·44m
🔐Quantum Security
A Practical Guide to Tableau Web Data Connectors for Finance
dev.to·1h·
Discuss: DEV
📜Family History Data
AURAD: Anatomy-Pathology Unified Radiology Synthesis with Progressive Representations
arxiv.org·44m
🦴Binary Paleontology
Boosting Plasma Etch Uniformity via Adaptive Feedback Control of RF Power Distribution
dev.to·8h·
Discuss: DEV
📄Document Digitization
GPS Spoofing Attacks on Automated Frequency Coordination System in Wi-Fi 6E and Beyond
arxiv.org·4d
📡Bluetooth Archaeology
Why Language Models Hallucinate: An In-Depth Look at Model Misalignment and Mitigation Strategies (2025)
dev.to·9h·
Discuss: DEV
🌀Brotli Internals
Surviving the Nightmare: My Biohazard CTF Adventure
infosecwriteups.com·1d
🔓Password Cracking
The Tmux Menagerie
worksonmymachine.ai·15h·
Discuss: Hacker News
🪟Awesome windows command-line
Why Powerful But Hard To Detect Backdoors Could Become A Routine Problem For Open Source Projects Because Of AI
techdirt.com·3d·
Discuss: Hacker News
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap