๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โœ… Format Validation

Schema Checking, Structure Verification, Binary Analysis, Preservation Tools

Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท2d
โœ…Archive Validation
Python isdigit vs isnumeric
dev.toยท1dยท
Discuss: DEV
โœ…Format Verification
An easy-to-implement, arena-friendly hash map
nullprogram.comยท11hยท
Discuss: Lobsters
๐Ÿ”Hash Functions
How To Solve Every Programming Problem
blog.codeminer42.comยท13h
๐Ÿ“Interval Arithmetic
Generating Inputs for Grammar Mining using Dynamic Symbolic Execution
arxiv.orgยท4h
๐Ÿฆ€Rust Macros
Testing PowerSync with Jepsen for Causal Consistency and More
github.comยท12hยท
Discuss: Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
Digital Forensics Round-Up, August 06 2025
forensicfocus.comยท16h
๐Ÿ”Archive Cryptanalysis
DNS at IETF 123
potaroo.netยท1d
๐ŸŒDNS Security
p-fast trie, but smaller
dotat.atยท15hยท
Discuss: Hacker News
๐ŸŒณTrie Structures
External Network Penetration Testing and Best Practices
hackerone.comยท16h
๐Ÿ•ต๏ธPenetration Testing
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.orgยท1d
๐Ÿ”“Open Source Software
Building a Real Estate Tokenization dApp with Flare's Zero-Fee Oracles
dev.toยท2dยท
Discuss: DEV
๐ŸššData Migration
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.comยท17h
๐Ÿ›กCybersecurity
TC39 Advances 11 Proposals for Math Precision, Binary APIs, and More
socket.devยท1dยท
Discuss: Hacker News
๐ŸŽฏGradual Typing
KeyCraft M5
hackster.ioยท11h
โš™๏ธDIY Electronics
Analysing Snapshot Isolation
muratbuffalo.blogspot.comยท1dยท
Discuss: www.blogger.com
๐ŸŒณPersistent Data Structures
Show HN: Lebenslauf โ€“ A CV builder with Markdown, templates, and local storage
cvmd.vercel.appยท19hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท2d
โš—๏ธAlgebraic Coding
We went from unauthenticated to arbitrary RCE in CyberArk Conjur
cyata.aiยท1hยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
The Amaranth hardware description language
amaranth-lang.orgยท1dยท
Discuss: Hacker News
๐Ÿ”FPGA Verification
Loading...Loading more...
AboutBlogChangelogRoadmap