🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Flickr Foundation goes Dutch!
flickr.org·1d
🏛Digital humanities
Mysterious Radio Pulses Found in Antarctica Seem to Defy Physics, and Researchers Are Trying to Trace Their Origins
smithsonianmag.com·1d
🔍Tape Forensics
Using LLMs in CI/CD for semantic testing of web content
plo.ug·1d·
Discuss: Hacker News
⚡Proof Automation
Navy SEALs, Performance vs. Trust, and AI
mljar.com·1d·
Discuss: Hacker News
🎯Threat Hunting
I built a small social network in go
github.com·13h·
Discuss: r/golang
📝ABNF Parsing
A language, IDE, and serverless runtime for spreadsheet-style logic
parabola.io·8h·
Discuss: Hacker News
🔄Language Evolution
Which operating system was targeted by the first ever mobile phone virus?
techspot.com·2d
🔓Hacking
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.com·3d·
Discuss: Hacker News
🔐PKI Archaeology
Just finished my new NAS
reddit.com·8h·
Discuss: r/homelab
🏠HomeLab
Deadly Risks: 5 Crypto Entrepreneurs and Investors Who Paid the Ultimate Price
hackernoon.com·1d
🎫Kerberos Attacks
API again: Org Takeover
infosecwriteups.com·4d
🏺ZIP Archaeology
Curriculum-Guided Antifragile Reinforcement Learning for Secure UAV Deconfliction under Observation-Space Attacks
arxiv.org·20h
🎯Threat Hunting
Unla: Instantly turn APIs n MCP servers into MCP servers,no code changes needed
github.com·1d·
Discuss: Hacker News
🔌Interface Evolution
AI Agent Architecture and the Autonomous Enterprise
dev.to·13h·
Discuss: DEV
⚙️TLA+
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Who are your MCP servers talking to?
dev.to·1d·
Discuss: DEV
📦Container Security
Probing AI Safety with Source Code
arxiv.org·1d
✨Effect Handlers
💎 Bespoke Opportunity Forge: AI-Powered Job Concierge 📬
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
Day 9 - Kicking Off Sprint 1 – Authentication, Workspaces, and Case Management
dev.to·3d·
Discuss: DEV
🔗Data Provenance
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·1d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap