🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Capability Systems

Object Capabilities, Access Control, Security Models, seL4

PsMapExec – PowerShell Command Mapping for Lateral Movement
darknet.org.uk·1d
🎫Kerberos Exploitation
Extensions and Shadows (6)
sites.psu.edu·4d
🎯Proof Tactics
Strengthening cybersecurity communities at Phoenix Summit 2025
blog.apnic.net·1d
🎯Threat Hunting
A Programmer’s Guide to x86-64 Assembly (Series Overview)
blog.codingconfessions.com·2d
🔧RISC-V Assembler
Forensic journey: Breaking down the UserAssist artifact structure
securelist.com·4d
🔍NTLM Archaeology
InfoSec News Nuggets 7/18/2025
aboutdfir.com·17h
🎫Kerberos Attacks
Thoughts on edent's 'We've got to stop sending files to each other'
neilzone.co.uk·1d
✅Document Verification
Types That Count: Journey across Qualitative and Quantitative Intersection Types
iris.unito.it·4d·
Discuss: Hacker News
🔍Type Inference
Chesterton’s Fence and paralysing your organization
frederickvanbrabant.com·4d·
Discuss: Hacker News, r/programming
🧲Magnetic Philosophy
My favorite use-case for AI is writing logs
newsletter.vickiboykis.com·1d·
Discuss: Lobsters, Hacker News
🌳Incremental Parsing
No, phishers are not bypassing FIDO MFA, at least not yet. Here’s why.
arstechnica.com·9h
🎫Kerberos Attacks
Post-Quantum Cryptography 2025: Latest Developments and Why It Matters
dev.to·1d·
Discuss: DEV
🔐Quantum Security
Xiangqi-R1: Enhancing Spatial Strategic Reasoning in LLMs for Chinese Chess via Reinforcement Learning
arxiv.org·2d
🔲Cellular Automata
From Black Box to Glass Box: Why AI Observability Is the Cornerstone of Reliable ITSM
dev.to·3d·
Discuss: DEV
👁️System Observability
[R] Paper recommendations?
reddit.com·9h·
Discuss: r/MachineLearning
🧠Machine Learning
The Rise of Autonomous AI Agents: From Promise to Production in 2025
dev.to·2d·
Discuss: DEV
🔲Cellular Automata
Best VPS & VDS Hosting 2025: The Only Guide You’ll Need for Smart, Scalable Projects
hackernoon.com·23h
🖥️Self-hosted Infrastructure
Don’t Waste Your Labeled Anomalies: 3 Practical Strategies to Boost Anomaly Detection Performance
towardsdatascience.com·1d
🌲B-tree Forensics
Static or Temporal? Semantic Scene Simplification to Aid Wayfinding in Immersive Simulations of Bionic Vision
arxiv.org·3d
✋Tactile Computing
Why AI-Integrated Cloud Hosting Is the Best Choice for SaaS and Web Apps
dev.to·1d·
Discuss: DEV
🏠Homelab Orchestration
Loading...Loading more...
AboutBlogChangelogRoadmap