๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

What an SMS blaster is, and how to protect yourself from malicious SMS messages while traveling | Kaspersky official blog
kaspersky.comยท22h
๐ŸŒNetworkProtocols
The Covert Hardware Implant: Part 1
rift.stacktitan.comยท19hยท
Discuss: Hacker News
๐Ÿ”ŒSingle Board PC
LLM Inference Handbook
bentoml.comยท1dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
What is device intelligence? An explainer guide
fingerprint.comยท2d
๐ŸบKerberos Archaeology
Monitoring My Homelab, Simply
b.tuxes.ukยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ“ŠHomelab Monitoring
Inside the Adversary's Mindset: The #1 Skill Missing From Most Cyber Defenders
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
A Practical Guide to Goโ€™s Fan-in and Fan-out Concurrency Patterns
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
[Media] Practice typing out Rust code to get comfortable with the syntax
reddit.comยท1dยท
Discuss: r/rust
๐Ÿฆ€Rust Macros
Fix the Click: Preventing the ClickFix Attack Vector
unit42.paloaltonetworks.comยท2d
๐ŸŽซKerberos Exploitation
Trend Micro: Several products with high-risk loopholes
heise.deยท1d
๐Ÿ”“Hacking
Python List Manipulation: Remove Specific, Even, and Special Numbers Tutorial
dev.toยท20hยท
Discuss: DEV
โญAwesome lists
Python Memory Optimization: Essential Techniques for Data-Intensive Applications That Actually Work
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Consistent and Asymptotically Efficient Localization from Bearing-only Measurements
arxiv.orgยท1d
๐Ÿง Machine Learning
QuHE: Optimizing Utility-Cost in Quantum Key Distribution and Homomorphic Encryption Enabled Secure Edge Computing Networks
arxiv.orgยท3d
๐Ÿ”ฒLattice Cryptography
Fridge-photo based recipe generator by using Google AI Studio
dev.toยท16hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Homeostatic Adaptation of Optimal Population Codes under Metabolic Stress
arxiv.orgยท1d
๐Ÿ”ฒCellular Automata
Subgraph Counting under Edge Local Differential Privacy Based on Noisy Adjacency Matrix
arxiv.orgยท2d
๐Ÿ“ˆSpectral Graph Theory
Customer, Employee Data Exposed in Nippon Steel Breach
darkreading.comยท1d
๐Ÿ”“Hacking
Machine Learning Fundamentals: data augmentation project
dev.toยท20hยท
Discuss: DEV
โšกIncremental Computation
Bluish Veil Detection and Lesion Classification using Custom Deep Learnable Layers with Explainable Artificial Intelligence (XAI)
arxiv.orgยท1d
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap