๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

ChromaLex
hackster.ioยท2d
๐Ÿ“ฑQR Archaeology
Evaluation of Hashing Algorithms Ascon, SHA256, SHA512 and BLAKE3 on a Cortex M7
aa55.devยท1dยท
Discuss: Hacker News
๐ŸฆพARM Cortex-M
InfoSec News Nuggets 8/25/2025
aboutdfir.comยท14h
๐Ÿ”“Hacking
Is math discovered or invented?
mathwithbaddrawings.comยท16h
๐Ÿ“Mathematical Art
The Day I Logged in with a Hash
gsociety.frยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
How Many Paths of Length K Are There Between a and B?
horace.ioยท1dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธGraph Algorithms
Which is the stronger password? g72$l#pT9a or โ€“.COW
ianmccloy.comยท16hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท2dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.comยท14h
๐Ÿ›ก๏ธARM TrustZone
Luhn algorithm โ€“ Credit card number verification
en.wikipedia.orgยท2dยท
Discuss: Hacker News
๐Ÿ”„CRC Algorithms
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.comยท5hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
What Happens When You Sign a Crypto Transaction (And What Could Go Wrong)
hackernoon.comยท22h
๐Ÿ”—Hash Chains
Structural vs. Mathematical โ€œUnderโ€ (2023)
dyalog.comยท3hยท
Discuss: Lobsters, Hacker News
๐ŸšShell Calculus
[P] aligning non-linear features with your data distribution
reddit.comยท16hยท
Discuss: r/MachineLearning
๐Ÿง Machine Learning
RomCom and TransferLoader IoCs in the Spotlight
circleid.comยท12h
๐Ÿ“กDNS Archaeology
Using information theory to solve Mastermind
goranssongaspar.comยท2dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
Elasticsearch Explained with Real-Life Example: Why It Beats SQL for Search
blog.devops.devยท13h
๐Ÿš€Query Optimization
A Bitcoin Core Code Analysis
binaryigor.comยท12hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.netยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”—Functional Compilers
Loading...Loading more...
AboutBlogChangelogRoadmap