🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

SpacehuhnTech/esp8266_deauther
github.com·1d
📻Homebrew Protocols
Fibonacci Funhouse: Exploring Ruby Algorithms for Fibonacci Numbers
rorvswild.com·7h·
Discuss: Hacker News
📐Interval Arithmetic
Cloud Storage Is Full Email Scam: What It Is and How to Protect Yourself
malwaretips.com·2d·
Discuss: Hacker News
💧Digital Watermarking
Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World
wired.com·1d·
Discuss: Hacker News
🔓Hacking
A Curated List of CLI Commands for Google's Gemini CLI Coding Agent
dotgemini.dev·2d·
Discuss: Hacker News
📟CLI Design
Ask HN: Feedback on a new framework aiming at the classic RPC headaches
news.ycombinator.com·1d·
Discuss: Hacker News
⚡gRPC
Big clouds scramble as EU Data Act brings new data transfer rules
theregister.com·5h·
Discuss: Hacker News
🏠Homelab Federation
Codebuff: Generate Code from the Terminal
github.com·21h·
Discuss: Hacker News
🦀Rust Macros
New Android RAT uses Near Field Communication to automatically steal money from devices
techradar.com·5h
🕵️Vector Smuggling
How to prevent multi-accounting and stop fraud
fingerprint.com·2d
🔗Binary Similarity
Autonomous Thermal Anomaly Detection via Multi-Modal Sensor Fusion and Dynamic Bayesian Networks
dev.to·1d·
Discuss: DEV
📊Homelab Monitoring
Enhanced Dark Matter Detection via Quantum-Enhanced Signal Processing in Axion Search Experiments
dev.to·1h·
Discuss: DEV
⚛️Quantum Codecs
Algorithmic Anomaly Detection in Social Movement Framing Strategies: A Quantified Resilience Analysis
dev.to·6h·
Discuss: DEV
📄Text Mining
Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years
theregister.com·1h
🔓Hacking
Visualizing Gin: A Different Kind of Code Walkthrough
dev.to·3h·
Discuss: DEV
📊Dependency Graphs
How-to Safely Expose your MCP Servers Externally Using ngrok and ToolHive
dev.to·1d·
Discuss: DEV
⚡gRPC
**Master Python Memory Management: 8 Essential Optimization Techniques for Performance**
dev.to·1d·
Discuss: DEV
🧠Memory Allocators
Another Sleeping Giant: Microsoft’s Root Program and the 1.1.1.1 Certificate Slip
unmitigatedrisk.com·6d·
Discuss: Hacker News
🌐DNS Security
Human-Hardware-in-the-Loop simulations for systemic resilience assessment in cyber-socio-technical systems
arxiv.org·1d
⚙️systems theory
No gains, just pains as 1.6M fitness phone call recordings exposed online
theregister.com·1d·
Discuss: Hacker News
🔊Acoustic Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap