๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โœ… Checksum Validation

SHA-256, MD5, Data Integrity, Error Detection

noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.orgยท10h
๐Ÿฆ€Embedded Rust
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท22h
โœ…Format Verification
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.toยท4dยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Binary Exploitation 101 - Introduction
r1ru.github.ioยท19h
๐Ÿ“ผCassette Hacking
DropSum 1.2 is more flexible in handling text
eclecticlight.coยท4h
๐Ÿ” Terminal Fonts
(็นไธญ) The Art of PHP โ€” My CTF Journey and Untold Stories!
blog.orange.twยท8h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Using pprint.saferepr() for string comparisons in Python
chipx86.blogยท8h
โœ…Format Verification
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท20h
๐Ÿฆ€Rust Macros
Show HN: DataCompose โ€“ Prevent downstream data failures with composite functions
datacompose.ioยท1dยท
Discuss: Hacker News
โœ…Format Validation
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท2d
๐Ÿ”Quantum Security
Code does not lie
nocomplexity.comยท2d
๐Ÿ”’Language-based security
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.orgยท6h
๐Ÿ”Vector Forensics
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท18h
๐Ÿ‘๏ธSystem Observability
Jetkvm is now available at retail via ikoolcore! Available to USA!
ikoolcore.comยท3hยท
Discuss: r/homelab
๐Ÿ”ŒOperating system internals
Exploits and vulnerabilities in Q2 2025
securelist.comยท48m
๐Ÿ”“Hacking
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท21h
๐Ÿ’ฃZIP Vulnerabilities
Google Will Require Developer Verification Even for Sideloading
hackaday.comยท8h
๐Ÿ“œProof Carrying Code
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Loading...Loading more...
AboutBlogChangelogRoadmap