🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔤 Character Encoding

Historical Encodings, Code Page Archaeology, EBCDIC Legacy, Translation Tables

Encrypting identifiers in practice
sjoerdlangkemper.nl·13h
🌊Stream Ciphers
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·21h·
Discuss: Hacker News
🕸️WebP Analysis
The one-more-re-nightmare compiler (2021)
applied-langua.ge·1d·
Discuss: Lobsters, r/programming
🔍RegEx Engines
Barcode Tool - Generator & Scanner
ricardodeazambuja.com·9h
📱QR Archaeology
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.com·11h
📝Concrete Syntax
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·9h
🔍NTLM Forensics
How do CAPTCHAs Work?
corero.com·4h
⚡Proof Automation
5 huge stumbling blocks to legacy mainframe EOL
techradar.com·11h
🏛️Mainframe Archaeology
BNFGen: A random text generator based on context-free grammars
baturin.org·27m·
Discuss: Hacker News
🌳Context free grammars
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·21h
🔗Data Provenance
An unfinished post: "Compressing short Unicode strings with BOCU-1"
evanhahn.com·6d
🌏Character Sets
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·1d
🌳Archive Merkle Trees
Kumo Surfaces Structured Data Patterns Generative AI Misses
thenewstack.io·4h
📊Graph Databases
The modern text processing pipeline: Overview
newroadoldway.com·1d·
Discuss: Lobsters, r/programming
🔤Unicode Normalization
Experimenting with Apple’s AI models inside Shortcuts
sixcolors.com·2h
⚡Proof Automation
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.to·5h·
Discuss: DEV
🔐Homomorphic Encryption
Cactus Language • Syntax 12
inquiryintoinquiry.com·2h
📝Concrete Syntax
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.ch·9h
🗃️Database Storage
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·4h
🕵️Penetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap