🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Interactive Provers

Proof Development, Tactic Languages, Theorem Proving, Mathematical Verification

Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.il·18h·
Discuss: Hacker News
🎯Proof Tactics
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.to·58m·
Discuss: DEV
🌀Brotli Internals
Protocols for Verifying Smooth Strategies in Bandits and Games
arxiv.org·12h
🎯Performance Proofs
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.com·1d
🦀Rust Verification
Cactus Language • Stylistics 4
inquiryintoinquiry.com·1d
🌳Context free grammars
Functional Abstract Interpretation
simon.peytonjones.org·1d·
Discuss: Hacker News
🔗Functional Compilers
W1seGuy | TryHackMe Walkthrough — XOR? BrUt3_F0rC3 iT
infosecwriteups.com·2d
🔐Cryptographic Archaeology
Asymmetry of Verification and Verifier's Law
jasonwei.net·14h·
Discuss: Hacker News
🔮Proof Search
A Poet Completes the Square
denisegaskins.com·3h
⚔️Lean Tactics
To be a better programmer, write little proofs in your head
the-nerve-blog.ghost.io·1d·
Discuss: Hacker News, r/programming
🛡️Preservation Proofs
Proof by Intimidation
en.wikipedia.org·7h·
Discuss: Hacker News
🎯Proof Tactics
FSM Library for Embedded C Projects
hackster.io·2d
🦀Embedded Rust
Pointwise definable end-extensions of models of arithmetic and set theory, Changchun, China, July 2025
jdh.hamkins.org·2d
🏗️Constructive Mathematics
Next Gen TTPs in the Threat Actor's Playbook
cofense.com·11h
🎯NTLM Attacks
Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any scale (preview)
aws.amazon.com·1h·
Discuss: Hacker News
🤖Network Automation
Binary Search in a 2D Matrix
mmhaskell.com·2d
📐Error Bounds
Heterogeneous Dynamic Logic: Provability Modulo Program Theories
arxiv.org·2d
🧠Computational Logic
Performance Hacks for Brady’s Algorithm
nickdrozd.github.io·1d
🎞️Tape Combinatorics
Checking data integrity
eclecticlight.co·9h
✅Checksum Validation
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·2h
🔓Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap