๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

CodeMirror and Spell Checking: Solved
chipx86.blogยท12h
๐ŸŒณIncremental Parsing
Lunar Spider โ€“ Lotus V2 Loader Campaign Using Fake CAPTCHA Delivery and DLL Sideloading
research.kudelskisecurity.comยท4h
๐ŸŽซKerberos Exploitation
How to Handle Race Conditions in Ruby on Rails Applications
blog.devops.devยท20h
๐Ÿ“Database WAL
Risky Bulletin: Phishers abuse forgotten Direct Send feature
news.risky.bizยท9h
๐Ÿ”“Hacking
The one-more-re-nightmare compiler (2021)
applied-langua.geยท2dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”RegEx Engines
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.comยท16h
โš™๏ธWASM Runtime
chaotic_job: Resilience test helpers for Active Job
github.comยท12hยท
Discuss: Hacker News
๐Ÿ”Concolic Testing
How Letโ€™s Encrypt reduced the impact of zombie clients
blog.apnic.netยท12h
๐ŸŒณArchive Merkle Trees
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.toยท20hยท
Discuss: DEV
๐Ÿ›กCybersecurity
How AI Helped Me Build a CRM Integration 60% Faster: A Real Vue.js + CouchDB Case Study
dev.toยท17hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Automating CSV Data for Reliable API Testing
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ŒArchive APIs
Rethinking Web3 Privacy: What You Can Actually Build with Sapphire
dev.toยท17hยท
Discuss: DEV
๐Ÿ”—Hash Chains
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท3d
๐Ÿ”ขBitwise Algorithms
The Power of Strong Linearizability: the Difficulty of Consistent Refereeing
arxiv.orgยท3d
๐ŸŽฏPerformance Proofs
From Manual to AI: My Journey with Keploy Chrome Extension
dev.toยท4hยท
Discuss: DEV
๐ŸŽฌWebCodecs API
๐Ÿ” Throwback Thursday: That Time I Thought I Understood Microservices
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Developing AI-Powered Applications with LLMs on Google Cloud
dev.toยท1hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
5 Ways to Automate Security and Compliance in a Cloud-First World
hackernoon.comยท23h
๐Ÿ”“Hacking
Libxml2's "no security embargoes" policy
lwn.netยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Rsync Vulnerabilities Open the Door to Remote Exploits
dev.toยท4dยท
Discuss: DEV
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap