๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

What is SAST and DAST? Key Differences Explained
boostsecurity.ioยท1d
๐Ÿ•ต๏ธPenetration Testing
CISOs grow more concerned about risk of material cyberattack
cybersecuritydive.comยท1h
๐Ÿ›กCybersecurity
The Nickel Configuration Language
nickel-lang.orgยท2dยท
Discuss: Hacker News
๐Ÿ“‹Format Specification
What Happens When You Sign a Crypto Transaction (And What Could Go Wrong)
hackernoon.comยท1d
๐Ÿ”—Hash Chains
Go and SQLite Best Practices
jacob.goldยท1dยท
Discuss: Hacker News
๐Ÿ’พSQLite
ImageIO, the Infamous iOS Zero Click Attack Vector (2024)
r00tkitsmm.github.ioยท3dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Evaluation of Hashing Algorithms Ascon, SHA256, SHA512 and BLAKE3 on a Cortex M7
aa55.devยท1dยท
Discuss: Hacker News
๐ŸฆพARM Cortex-M
AIโ€™s Extractable Model is Unsustainable and Blockchain Can Fix Itโ€”OpenLedger CEO Talks Candidly
hackernoon.comยท7h
๐Ÿ“กRSS Automation
Why AI Probably Won't Help Your Team Ship More Product
chaoticgood.managementยท1hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Fixing my Old OS Assignment with Machine Code Hacks
gridbugs.orgยท1dยท
Discuss: r/programming
๐Ÿ“ŸTerminal Forensics
IBM x346 server to at home storage
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ› ๏ธGreaseweazle
Decentralizing AIS: Trustless Maritime Tracking with SDR
rtl-sdr.comยท11h
๐Ÿ‘๏ธObservatory Systems
Paradigms of Intelligence Team
github.comยท2hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
The MLOps Maturity Playbook: Practical Steps to Production-Ready ML
blog.devops.devยท1d
๐Ÿ”„Reproducible Builds
๐Ÿ’ปMCP: Protocol as Product, Hype as Standard
dev.toยท1dยท
Discuss: DEV
๐ŸบProtocol Archaeology
Invisible Filters: Cultural Bias in Hiring Evaluations Using Large Language Models
arxiv.orgยท11h
๐ŸŒCultural Algorithms
Show HN: Get insights from Hacker News on X
github.comยท22hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท22hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Analysis of Harpy's Constrained Trotting and Jumping Maneuver
arxiv.orgยท11h
๐ŸŒ€Differential Geometry
Show HN: Open-source Go repo comparing DCA vs. Grid with reproducible backtests
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Loading...Loading more...
AboutBlogChangelogRoadmap