🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

The rebirth of Wragge Labs (and moving my Heroku apps)
updates.timsherratt.org·5h
🌀Brotli Internals
Tackle API Sprawl with a Holistic Discovery Strategy
thenewstack.io·21h
🔌Archive APIs
InfoSec News Nuggets 7/8/2025
aboutdfir.com·22h
🛡Cybersecurity
Pinger: A simple network latency and packet loss monitor
github.com·1d·
Discuss: Hacker News
📡Network Monitoring
Be careful where you click in Google search results - it could be damaging malware
techradar.com·17h
🏺Kerberos Archaeology
The Open-Source Software Saving the Internet From AI Bot Scrapers
news.slashdot.org·1d
🚀Indie Hacking
Let's Encrypt issues first IP certificate
heise.de·1d
🔐Certificate Analysis
Graph Diffusion-Based AeBS Deployment and Resource Allocation for RSMA-Enabled URLLC Low-Altitude Economy Networks
arxiv.org·1d
🕸️Network Topology
Programming Extensible Data Types in Rust with CGP - Part 1: Modular App Construction and Extensible Builders
contextgeneric.dev·1d·
Discuss: Lobsters, Hacker News, r/programming
🔒Type Safety
Btrfs Allocator Hints
lwn.net·54m·
Discuss: Hacker News
📦Content Addressing
Built a Golang CLI tool for web reconnaissance – looking for feedback
reddit.com·2d·
Discuss: r/golang
🕵️Domain Enumeration
Creating a Webhook API Endpoint with n8n
dev.to·1d·
Discuss: DEV
🌐Network Protocols
MitM Flaw in Bitchat: Identity Is a Bitchat Challenge
supernetworks.org·1d·
Discuss: Hacker News
🧪Protocol Fuzzing
Breakthrough in Semiconductor Technology Paves the Way for Faster 6G Networks
techbriefs.com·21h·
Discuss: Hacker News
🖥️Terminal Renaissance
5 vital features reliable endpoint protection services need to have
techradar.com·2h
🛡️eBPF Security
I use mesh Wi-Fi instead of a standalone router
pocket-lint.com·2d·
Discuss: Hacker News
🕸️Mesh Networking
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·20h
🔐Quantum Security
I solved the IIT-JEE Mains paper with LLM. Here are the results
iexplain.app·1d·
Discuss: Hacker News
📐Interval Arithmetic
Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark]
arxiv.org·8h
🌳Archive Merkle Trees
Popular industry security tool repurposed by cybercriminals to deploy infostealer malware — Shellter developer blasts 'reckless and unprofessional' researchers ...
tomshardware.com·21h
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap