๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Breaking the code in network theory: Bimodularity reveals direction of influence in complex systems
phys.orgยท10h
๐ŸŒŠSpectral Clustering
Decentralizing AIS: Trustless Maritime Tracking with SDR
rtl-sdr.comยท1d
๐Ÿ‘๏ธObservatory Systems
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท16h
โœ…Format Verification
Ransomware-Resilient Storage
infoq.comยท9hยท
Discuss: Hacker News
๐Ÿ’ฟWORM Storage
Security Flaws in the WebMonetization Site
shkspr.mobiยท16hยท
Discuss: Hacker News, shkspr.mobi
๐Ÿ“กFeed Security
Portable Virtualized Router/Firewall Platform โ€“ Secure Networking Anywhere
reddit.comยท13hยท
Discuss: r/homelab
๐Ÿ HomeLab
Securing Heterogeneous Network (HetNet) Communications for Wildfire Management: Mitigating the Effects of Adversarial and Environmental Threats
arxiv.orgยท1d
๐Ÿ•ธ๏ธMesh Networking
Understanding Tool-Integrated Reasoning
arxiv.orgยท21m
๐Ÿ”—Constraint Handling
RomCom and TransferLoader IoCs in the Spotlight
circleid.comยท1d
๐Ÿ“กDNS Archaeology
**High-Performance Packet Processing: Combining eBPF, XDP, and Go for Million-Packet-Per-Second Throughput**
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธeBPF Programs
ScreenConnect admins targeted by spear phishing attacks
heise.deยท19h
๐ŸŽซKerberos Attacks
Donโ€™t Marry an LLM, Date Many
dev.toยท5hยท
Discuss: DEV
๐Ÿ”’Linear Types
Hacker and Physicist โ€“ A Tale of "Common Sense"
supasaf.comยท4dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.orgยท21m
๐Ÿ”Vector Forensics
Canary tokens: Learn all about the unsung heroes of security at Grafana Labs
grafana.comยท6hยท
Discuss: Hacker News
๐ŸบKerberos Archaeology
Fast-Spreading, Complex Phishing Campaign Installs RATs
darkreading.comยท1d
๐Ÿ”“Hacking
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.aiยท9hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Learning how MCP works by reading logs โ€“ and building MCP Interceptor
thomasgauvin.comยท8hยท
Discuss: Hacker News
โšกgRPC
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
The Science of Intelligent Exploration: Why We Need Exploration in AI
richardcsuwandi.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap