🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Domain Enumeration

Active Directory Discovery, Network Reconnaissance, Security Assessment, LDAP Queries

Claude Code Status Line Script
andreagrandi.it·1d
🪟Awesome windows command-line
Cactus Language • Pragmatics 13
inquiryintoinquiry.com·4d
🔢Denotational Semantics
DOTADIW (Do One Thing and Do It Well)
brajeshwar.com·3d
🐚Shell Calculus
UN/Electronic Data Interchange for Administration, Commerce and Transport
en.wikipedia.org·3d·
Discuss: Hacker News
📋Format Specification
Simplifying Code: Migrating from Reactive to Virtual Threads
scalex.dev·2d·
Discuss: Hacker News
🌊Stream Processing
Microsoft exec's vision of Windows 12 and beyond could terrify some of you
techradar.com·1d
🔌Operating system internals
Some users report their Firefox browser is scoffing CPU power
theregister.com·3d·
Discuss: Hacker News, Hacker News
🚀Indie Hacking
Fuzzy-Pattern Tsetlin Machine
arxiv.org·3d
🔤Morris-Pratt
Show HN: Open-source market screener and backtester for algo traders
github.com·3d·
Discuss: Hacker News
🔍BitFunnel
Automated Anomaly Detection in UAV-Based Wildlife Tracking via Spatiotemporal Markov Chains
dev.to·4d·
Discuss: DEV
🎯Threat Hunting
Automated Quench Optimization via Multi-Modal Data Fusion and Reinforcement Learning
dev.to·3d·
Discuss: DEV
🧮Algorithmic Cooking
IoT Air Quality Monitoring for Post-Cleaning Verification in Rental Properties
dev.to·1d·
Discuss: DEV
🏠Home Automation
PROPS: Progressively Private Self-alignment of Large Language Models
arxiv.org·4d
💻Local LLMs
How AI Is Changing the Game in Phishing Attacks
dev.to·2d·
Discuss: DEV
🔓Hacking
Dynamic Thermal Bridging Mitigation via Adaptive Metamaterial Grading
dev.to·2d·
Discuss: DEV
🧮Algorithmic Cooking
Gaza: Over 100 humanitarian organizations denounce Israeli rules for aid groups
lemonde.fr·2d
🧅Tor Networks
Will Secure AI Be the Hottest Career Path in Cybersecurity?
darkreading.com·4d
🛡Cybersecurity
Get Pwned, Get Local Advice From a Trusted Gov Source
troyhunt.com·3d
🔓Hacking
Numerical Considerations in Weighted Model Counting
arxiv.org·5d
📐Error Bounds
Narrative Memory in Machines: Multi-Agent Arc Extraction in Serialized TV
arxiv.org·4d
⧗Information Bottleneck
Loading...Loading more...
AboutBlogChangelogRoadmap