🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

NDSA Welcomes Three New Members in Quarter Two of 2025
ndsa.org·22h
🏛️PREMIS Metadata
MX Linux MX-23.6 Libretto review - A bundle of awesome
dedoimedo.com·1d
🔌Operating system internals
Hymn of Babylon pieced together using AI
thetimes.com·18h·
Discuss: Hacker News
📜Palimpsest Analysis
Cancel Culture in Academia
papers.ssrn.com·13h·
Discuss: Hacker News
📊Citation Graphs
How could anyone use longhorn if you can’t secure the service? (Also request for alternatives)
reddit.com·21h·
Discuss: r/kubernetes
📦Container Security
VirtualFencer: Generating Fencing Bouts based on Strategies Extracted from In-the-Wild Videos
arxiv.org·1d
🔲Cellular Automata
This Is Why You Can't Trust AI to Review Your Mission-Critical Code
medium.com·2d
📏Code Metrics
Is Skill Really Wealth—Or a Trap in Digital Feudalism?
dev.to·15h·
Discuss: DEV
⚖️Emulation Ethics
GDPR violations prompt Germany to push Google and Apple to ban DeepSeek AI
securityaffairs.com·2d
🔤EBCDIC Privacy
Automatically Rewrite Container Image References in Kubernetes
github.com·2d·
Discuss: Hacker News
📦Container Security
Advancements in Machine Learning: Themes, Methods, and Future Directions from June 26, 2025 arXiv Submissions
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Top Vibe Coding Tools Create a Full Interactive Login Page
dev.to·1d·
Discuss: DEV
🎨Swedish Design Philosophy
The Ins and Outs of Engineering AI Prompts
dev.to·21h·
Discuss: DEV
⚡Proof Automation
After the Hack: Living the Dream!
dev.to·15h·
Discuss: DEV
🚀Indie Hacking
Vibe coding a Perl interface to a C library - Part 1
dev.to·2d·
Discuss: DEV
📝Concrete Syntax
CVE-2025–49144: Notepad++ vulnerability allows full system compromise
infosecwriteups.com·3d
💣ZIP Vulnerabilities
VSF-Med:A Vulnerability Scoring Framework for Medical Vision-Language Models
arxiv.org·1d
🛡️WASM Security
🎉 Build Your Own Personal Voice AI Agent to Control All Your Apps⚡
dev.to·2d·
Discuss: DEV
🎙️Whisper
Assessing GPTZero's Accuracy in Identifying AI vs. Human-Written Essays
arxiv.org·2d
⚡Proof Automation
Decentralized Public-Key Infrastructure: The Future of Supply Chain Security
hackernoon.com·1d
🤝Distributed Consensus
Loading...Loading more...
AboutBlogChangelogRoadmap