๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท3dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Are MDM solutions the right choice for your business?
proton.meยท21h
๐Ÿ”HSM Integration
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comยท1d
๐Ÿ•ต๏ธDomain Enumeration
Outlandish Recursive Query Examples
sqlite.orgยท14hยท
Discuss: Lobsters
๐Ÿ—„๏ธSQLite Internals
Multigres Architecture Overview
multigres.comยท1dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Sharding
Inline Style Exfiltration: leaking data with chained CSS conditionals
portswigger.netยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Five highlights from skin research
nature.comยท36m
โœ‹Tactile Computing
Show HN: Convert your Bubble and other no-code apps into full code
fullcode.yonocode.ioยท38mยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Running our Docker registry on-prem with Harbor
dev.37signals.comยท2hยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Visual AI flow manager for Genkit โ€“ Looking for early testers
flowshapr.aiยท1dยท
Discuss: Hacker News
โšกProof Automation
How to Run Multiple LLMs Locally Using Llama-Swap on a Single Server
kdnuggets.comยท2h
โš™๏ธWASM Runtime
Effective Clustering for Large Multi-Relational Graphs
arxiv.orgยท1d
๐ŸŒŠSpectral Clustering
The Adaptive Communication Framework (ACF) for Extraterrestrial Intelligence Discovery
arxiv.orgยท10h
๐Ÿ“ฐRSS Archaeology
Googleโ€™s URL Context Grounding: Another Nail in RAGโ€™s Coffin?
towardsdatascience.comยท1d
๐ŸŒ€Brotli Internals
Go Coding with Asparagos: The Smartest Peanut in the Neighborhood
dev.toยท1dยท
Discuss: DEV
๐Ÿ’พBinary codes
Benchmarking Class Activation Map Methods for Explainable Brain Hemorrhage Classification on Hemorica Dataset
arxiv.orgยท1d
๐Ÿง Machine Learning
IRE A HACKER RECOVERY CRYPTOCURRENCY / BANK RECOVERY EXPERT OPTIMUM HACKER RECOVERY
dev.toยท21hยท
Discuss: DEV
๐Ÿ”—Hash Chains
Evaluation and LLM-Guided Learning of ICD Coding Rationales
arxiv.orgยท1d
๐Ÿ”—Constraint Handling
Uncertainty Propagation Networks for Neural Ordinary Differential Equations
arxiv.orgยท1d
๐Ÿ“ŠQuantization
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.comยท2d
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap