🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Deep Dive: Model Merging with Arcee Fusion
julsimon.medium.com·11h
🏺Computational Archaeology
Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
welivesecurity.com·6d
🎫Kerberos Exploitation
Book Review: The Tainted Legacy of an Iconic Health Care Giant
undark.org·21h
🧲Magnetic Philosophy
Metriport (YC S22) is hiring engineers to improve healthcare data exchange
ycombinator.com·2d·
Discuss: Hacker News
🖥️Modern Terminals
Adding a feature because ChatGPT incorrectly thinks it exists
simonwillison.net·1d
🌀Brotli Internals
Build your own SQLite, Part 6: Overflow pages
blog.sylver.dev·1d·
Discuss: Hacker News
🗄️SQLite Internals
The Danish Sugar Beats Auction has a weird role in cryptography history
evervault.com·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
Maxon puts the Forger sculpting app for iPad on life support
theverge.com·13h
🏺ZIP Archaeology
Introducing Kafka Schema Registry for DigitalOcean Managed Kafka
digitalocean.com·1d
🌊Apache Kafka
Researchers reveal that AI models have distinct strategic fingerprints in classic game theory tests
the-decoder.com·1d
🔲Cellular Automata
From Idea to MVP in 90 Days: A Startup’s Product Development Journey with PowerGate Software
dev.to·5h·
Discuss: DEV
🔓Open Source Software
Sky TV Piracy Pair Arrested & IPTV Servers Seized After UK Police Raids
torrentfreak.com·1d
🏴‍☠️Piracy
401 or 500 errors with API integrations (REST/SOAP/OAuth) in Odoo. What are the causes and solutions?
dev.to·23h·
Discuss: DEV
🧪CBOR Fuzzing
Hungary and AI: efforts and opportunities in comparison with Singapore
arxiv.org·40m
🇳🇴Norwegian Computing
The Delta Learning Hypothesis: Preference Tuning on Weak Data can Yield Strong Gains
arxiv.org·40m
📊Learned Metrics
When Theia struck Earth, it helped set the stage for life to appear
phys.org·13h
🦴Binary Paleontology
Ransomware Attack Triggers Widespread Outage at Ingram Micro
darkreading.com·1d
🎫Kerberos Attacks
Get ahead of third-party risk or wave goodbye to your cyber resilience
techradar.com·1d
🛡Cybersecurity
Boosting Temporal Sentence Grounding via Causal Inference
arxiv.org·1d
🤖Grammar Induction
Show HN: Open-source AI prompt engineering workbench with systematic evaluation
github.com·2d·
Discuss: Hacker News
⚡Proof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap