๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Binary Parsers

Kaitai Struct, Format Specification, Reverse Engineering, Protocol Analysis

Investment Bank Interview 100 Noodles
mindyourdecisions.comยท1d
๐ŸŽฏProof Tactics
Decrypting and parsing HTTP/3 traffic in Wireshark
blog.elmo.sgยท3d
๐Ÿ“ŠPCAP Analysis
Defending Against NPM Supply Chain Attacks - NPM Vulnerability Scanner
blog.verichains.ioยท10h
๐Ÿ“ฆPackage Managers
I'm Using Perplexity
fldr.zipยท1dยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Show HN: Context, Hallucinations, and How LLMs Are Changing Development
juanpabloaj.substack.comยท7hยท
Discuss: Substack
๐ŸŒ€Brotli Internals
Week 1: Building ZipZen โ€“ Zero-Config Apt/YUM/Helm Repos
indiehackers.comยท1dยท
Discuss: Hacker News
โ„๏ธNix Flakes
The Progress of the Model Context Protocol (MCP) with John Capobianco [audio]
packetpushers.netยท2dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Widespread NPM Supply Chain Attack: Breaking Down Impact and Scope Across Debug
wiz.ioยท9hยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Implementing the Coffee Machine in Python
towardsdatascience.comยท1d
๐Ÿ”—Constraint Handling
Using AI as my engineering copilot (not autopilot)
dev.toยท8hยท
Discuss: DEV
โœจEffect Handlers
Evaluating the Efficiency of Latent Spaces via the Coupling-Matrix
arxiv.orgยท18h
๐Ÿง Machine Learning
Automated Scientific Literature Validation via Hyperdimensional Semantic Analysis & Causal Inference
dev.toยท11hยท
Discuss: DEV
๐Ÿš€SIMD Text Processing
Appleโ€™s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss
seclists.orgยท1d
๐Ÿ”’Hardware Attestation
Hackers Assemble 2: The Saga Completes
infosecwriteups.comยท2d
๐Ÿ“ŸTerminal Forensics
D-HUMOR: Dark Humor Understanding via Multimodal Open-ended Reasoning
arxiv.orgยท18h
๐Ÿ›Digital humanities
Agent Diary: Sep 9, 2025 - The Phantom Menace: When Commits Have Trust Issues
dev.toยท18hยท
Discuss: DEV
๐ŸŒณGit Internals
Mind the Gap: Evaluating Model- and Agentic-Level Vulnerabilities in LLMs with Action Graphs
arxiv.orgยท1d
โš™๏ธTLA+
Cooking with Google AI
dev.toยท2hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
GenAI Foundations โ€“ Chapter 5: Project Planning with the Generative AI Canvas
dev.toยท5hยท
Discuss: DEV
โšกProof Automation
Hyper-Osmotic Resilience: Computational Modeling & Predictive Control of Haloarchaeal Stress Response
dev.toยท1hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap