๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Analysing Malicious Domains with RIPE Atlas
labs.ripe.netยท1d
๐ŸŒWARC Forensics
Encrypting identifiers in practice
sjoerdlangkemper.nlยท19h
๐ŸŒŠStream Ciphers
[$] Libxml2's "no security embargoes" policy
lwn.netยท8h
๐Ÿ”“Free and open source
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing Oracle for DeFi
arxiv.orgยท20h
๐Ÿ”—Hash Chains
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.comยท1d
๐ŸบKerberos Archaeology
Building a Custom Amazon VPC from Scratch ๐Ÿš€
dev.toยท11hยท
Discuss: DEV
๐ŸŒDNS over QUIC
Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)
isc.sans.eduยท2d
๐Ÿ“กDNS Archaeology
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols๏ผˆ1750830996145900๏ผ‰
dev.toยท18hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Networking Fundamentals: Routing
dev.toยท4dยท
Discuss: DEV
๐Ÿ“กNetwork Protocol Design
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.comยท7h
๐Ÿ”“Hacking
How cybercriminals have become smarter and more dangerous than ever before
techradar.comยท1d
๐ŸŽฏThreat Hunting
Understanding and Improving Web Security Performance
forbes.comยท1dยท
Discuss: Hacker News, r/devops
๐ŸŒŠStreaming Systems
How Do You Perform an Effective Network Security Assessment?
securityscorecard.comยท1d
๐Ÿ•ต๏ธPenetration Testing
LiSec-RTF: Reinforcing RPL Resilience Against Routing Table Falsification Attack in 6LoWPAN
arxiv.orgยท1d
๐ŸŒณArchive Merkle Trees
Dual-Hierarchy Labelling: Scaling Up Distance Queries on Dynamic Road Networks
arxiv.orgยท1d
๐Ÿ“Range Queries
Slashing CI Costs at Uber
uber.comยท14hยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
This is how you build an AI Ransomware Worm
trufflesecurity.comยท2dยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comยท17h
๐Ÿ“‹Protocol Buffers
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toยท2hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Loading...Loading more...
AboutBlogChangelogRoadmap