🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·4d
✅Format Verification
We built a free Merge PDF tool in just 6 days – would love your feedback!
midmoo.com·1d·
Discuss: Hacker News, r/webdev, r/webdev
📄PostScript
Show HN: A minimal TS library that generates prompt injection attacks
prompt-injector.blueprintlab.io·1d·
Discuss: Hacker News
🛡️CLI Security
3Blue1Brown – But how does Bitcoin work?
3blue1brown.com·2d·
Discuss: Hacker News
🔗Hash Chains
Better to ask for permission than forgiveness
arnoutv.substack.com·1d·
Discuss: Substack
🔐Capability Security
Ask HN: Language Learning Tool combining ebooks, translations, audiobooks
news.ycombinator.com·16h·
Discuss: Hacker News
📝Concrete Syntax
Build Your Own Htmx
joshi.monster·18h·
Discuss: Hacker News
🦋Format Metamorphosis
When You No Longer Need That Object • Dealing With Garbage in Python
thepythoncodingstack.com·1d
🌳Persistent Data Structures
xAI sues an ex-employee for allegedly stealing trade secrets about Grok
engadget.com·14h
🔓Open Source Software
Guessing Game: Haskell Style
entropicthoughts.com·5d·
Discuss: Lobsters, Hacker News
👑Dependent Haskell
The AI Productivity Paradox- Chopping Wood Cubed
goodalexander.com·18h·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
CSVs Won't Die: The Cockroach of Data Formats
importcsv.com·1d·
Discuss: Hacker News
🗄️Type-safe Archives
Efficient Nanowire Laser Arrays via Dynamic Carrier Density Modulation
dev.to·1d·
Discuss: DEV
🔬Optical Physics
InSQuAD: In-Context Learning for Efficient Retrieval via Submodular Mutual Information to Enforce Quality and Diversity
arxiv.org·2d
🔍Information Retrieval
How's China stealing our stuff? Wonders DoD group responsible for foreign agents
theregister.com·2d·
Discuss: Hacker News
🛡Cybersecurity
Wispr Flow + Claude Transforms Content Creation
dev.to·1d·
Discuss: DEV
⚡Proof Automation
Optimize Go Performance: Value vs. Pointer Types for Fewer Memory Allocations
dev.to·4d·
Discuss: DEV
🧠Memory Allocators
Adaptive Network Slice Orchestration via Federated Reinforcement Learning for 5G+ Edge Computing
dev.to·1d·
Discuss: DEV
📡Network Calculus
Organizations Warned of Exploited Git Vulnerability
securityweek.com·4d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Building My Own DIY AI Stack
dev.to·17h·
Discuss: DEV
🚀Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap