🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

Shooting Bugs-in-a-Barrel with AI-Driven Binary Analysis on a Totolink Router
prizmlabs.io·1d·
Discuss: Hacker News
🧪CBOR Fuzzing
Swift Sendable: Mastering Thread Safety in iOS Development
dev.to·8h·
Discuss: DEV
🔬Refinement Types
Investigating HTTP Basic Auth Attack from a PCAP: A SOC Analyst’s Walkthrough
infosecwriteups.com·1d
🕵️Network Forensics
RaptorCast: Designing a Messaging Layer
category.xyz·1d·
Discuss: Hacker News
🤝Distributed Consensus
My first experience with Formal Methods | ZipCPU
zipcpu.com·21h
🔧Hardware Verification
Recent optimizations on integer to string conversions
reddit.com·16h·
Discuss: r/rust
🧮Algebraic Datatypes
graven-image: Portability library for CL image in REPL
github.com·13h·
Discuss: Lobsters
🦀Rust Macros
OS-Harm: A Benchmark for Measuring Safety of Computer Use Agents
arxiv.org·1d
🔓Hacking
OWASP Top for Business Logic Abuse
owasp.org·17h·
Discuss: Hacker News
🔒WASM Capabilities
Type Inference for Decompiled Code: From Hidden Semantics to Structured Insights
binarly.io·2d
🔓Decompilation
Cato CTRL™ Threat Research: PoC Attack Targeting Atlassian’s Model Context Protocol (MCP) Introduces New “Living off AI” Risk
simonwillison.net·8h
🎫Kerberos Exploitation
Five Uncomfortable Truths About LLMs in Production
lab.wallarm.com·22h
⚡Proof Automation
Pennybase: a Pound-Shop BaaS
zserge.com·3d
✅Format Validation
XML External Entity (XXE) Processing Vulnerability in GeoServer WFS Service (CVE-2025-30220)
research.kudelskisecurity.com·22h
📡RSS Extensions
Linters, Formatters, and Type-Checkers
playfulprogramming.com·1d
🎯Gradual Typing
How to Build a Fast Web3 dApp with GetBlock’s Free RPC
hackernoon.com·2d
🔐CBOR
Angular Security: How Pipes Leak Your Data
medium.com·16h·
Discuss: Hacker News
🛡️WASM Sandboxing
Structured Output for Beginners and 3 Prompting Tips
pocketflow.substack.com·7h·
Discuss: Substack
🌳Incremental Parsing
Confidential Inference via Trusted Virtual Machines
anthropic.com·1h·
Discuss: Hacker News
🔒Privacy Preserving
Java, What's Old? Part I: Collections
foojay.io·16h·
Discuss: Hacker News
🔢Binary Formats
Loading...Loading more...
AboutBlogChangelogRoadmap