🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“¦ Content Addressable

Git Internals, IPFS, Hash-based Storage, Deduplication

MeshCore is a lightweight alternative to Meshtastic LoRa-based off-grid messaging
cnx-software.comΒ·1d
πŸ•ΈοΈMesh Networking
Decart launches MirageLSD, an AI model that transforms live video feeds in real time
the-decoder.comΒ·1d
🌊Streaming Algorithms
'I love you': Virus caused B. in damage and exposed vulnerabilities which remain
cnn.comΒ·7hΒ·
Discuss: Hacker News
πŸ”“Hacking
Popular NPM linter packages hijacked via phishing to drop malware
bleepingcomputer.comΒ·1dΒ·
Discuss: Hacker News
πŸ“¦Package Managers
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
techcrunch.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Debcraft – Easiest way to modify and build Debian packages
optimizedbyotto.comΒ·2dΒ·
Discuss: Hacker News
πŸ“¦Package Managers
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.orgΒ·3dΒ·
Discuss: Hacker News
πŸ”’WASM Capabilities
How to write Rust in the Linux kernel: part 3
lwn.netΒ·2dΒ·
Discuss: Hacker News, r/programming
πŸ¦€Rust Borrowing
I Spy: Escalating to Entra ID's Global Admin with a First-Party App
securitylabs.datadoghq.comΒ·12hΒ·
Discuss: Hacker News
🎫Kerberos Exploitation
Show HN: I made an extension for VSCode that integrates opencode
marketplace.visualstudio.comΒ·1dΒ·
Discuss: Hacker News
πŸͺŸAwesome windows command-line
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.ioΒ·3dΒ·
Discuss: Hacker News
πŸ”“Hacking
A Practical Guide to Fine-Tuning and Inference with GR00T N1 & LeRobot on a Custom Dataset
dev.toΒ·17hΒ·
Discuss: DEV
🎯Emulator Accuracy
Remembering Chiptunes, the Demoscene and the Illegal Music of Keygens
hackaday.comΒ·2h
πŸ“ΌCassette Culture
Bug Bounty Recon: Tokens, PII, and CI/CD Metadata Leaked via JavaScript
infosecwriteups.comΒ·23h
πŸš€Indie Hacking
"Innovating Tomorrow: How Our Hackathon Project is Powering a Smarter Future"
dev.toΒ·14hΒ·
Discuss: DEV
🏠Home Automation
Reframing Software Development as a Spiritual Exercise
dev.toΒ·1dΒ·
Discuss: DEV
🧲Magnetic Philosophy
U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comΒ·14h
πŸ›‘Cybersecurity
Complete Beginner's Guide to Building AI Agents with LangChain and LangGraph
dev.toΒ·11hΒ·
Discuss: DEV
πŸ”—Constraint Handling
Import multiple CSV files into Power BI Desktop
dev.toΒ·13hΒ·
Discuss: DEV
πŸ€–Archive Automation
How Kiro Transformed My Vibe Coding into Structured, Production-Ready Development
dev.toΒ·2dΒ·
Discuss: DEV
🧱Immutable Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap