🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Checksum Validation

SHA-256, MD5, Data Integrity, Error Detection

noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·12h·
Discuss: Hacker News
🔱Galois Cryptography
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.to·3d·
Discuss: DEV
🌳Archive Merkle Trees
Code does not lie
nocomplexity.com·22h
🔒Language-based security
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·11h·
Discuss: Hacker News
✅Format Validation
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·14h·
Discuss: Hacker News
🔐Archive Encryption
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·22h
🔐Quantum Security
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·1d
🧪Binary Fuzzing
Claude Code's 19 cent Parser
blogger.com·17h
🔧Binary Parsers
A Bitcoin Core Code Analysis
binaryigor.com·15h·
Discuss: Hacker News
🧬Bitstream Evolution
The Day I Logged in with a Hash
gsociety.fr·1d·
Discuss: Hacker News
🔓Hacking
FLINT: Fast Library for Number Theory
flintlib.org·12h
🧮Algebraic Datatypes
Applying AI Analysis to PDF Threats
blog.virustotal.com·14h·
Discuss: blog.virustotal.com
🔍Binary Forensics
Formal verification effort for the ABDK Math 64.64 library using echidna/hevm
github.com·16h·
Discuss: Hacker News
✅Format Verification
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·16h
🛡Cybersecurity
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·2h
🎯Content Recommendation
Abhinav Sarkar: A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.net·2d
🔗Functional Compilers
Web hosting software cPanel: Updates close security gap
heise.de·21h
🛡️WASM Security
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.com·3d
🔐Cryptographic Archaeology
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·1d
🔓Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap