๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

linux-credentials/credentialsd
github.comยท18h
๐Ÿ”“Open Source Software
Mbodi AI (YC X25) Is Hiring a Founding Research Engineer (Robotics)
ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Smooth Minimum for Signed Distance Fields (2013)
iquilezles.orgยท1dยท
Discuss: Hacker News
๐ŸŒ€Differential Geometry
Understanding Go Error Types: Pointer vs. Value
blog.fillmore-labs.comยท16h
๐Ÿ“œProof Carrying Code
Lookup Table Madness (2004)
sqlservercentral.comยท3dยท
Discuss: Hacker News
๐ŸบDatabase Archaeology
Cisco discloses maximum-severity defect in firewall software
cyberscoop.comยท14h
๐ŸงชCBOR Fuzzing
Our DevOps stack and recent improvements
ngrok.comยท1dยท
Discuss: Hacker News
โ„๏ธNix Flakes
Understanding the Security Landscape of MCP
apideck.comยท5dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity
arxiv.orgยท1d
๐Ÿ”ขReed-Solomon Math
Usernames, Passwords, and Security
usenix.orgยท3d
๐Ÿ“กDNS Archaeology
Software Engineering Laws - Risk & Security
leadership.gardenยท1d
๐Ÿ›ก๏ธCLI Security
AI-powered cyberattacks have devastating potential โ€“ but governments can fight fire with fire
techradar.comยท20h
๐ŸŽฏThreat Hunting
๐Ÿš€AI + Crypto: The Collision That Could Redefine the Internet
dev.toยท20hยท
Discuss: DEV
๐Ÿ”—Hash Chains
Windows Entra IDs can be bypassed worryingly easily - here's what we know
techradar.comยท1d
๐ŸŽฏNTLM Attacks
Causal Graph Profiling via Structural Divergence for Robust Anomaly Detection in Cyber-Physical Systems
arxiv.orgยท2d
๐Ÿ”Vector Forensics
Automated Verification of Model-Based Design Transformations via Formal Methods and Deep Learning
dev.toยท1dยท
Discuss: DEV
โš™๏ธProof Engineering
Psyche-R1: Towards Reliable Psychological LLMs through Unified Empathy, Expertise, and Reasoning
arxiv.orgยท1d
๐Ÿ›Digital humanities
# Why I Built MCP Client Generator (And Why You Should Care)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
InfoSec News Nuggets 8/14/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Software Engineering Laws - Quality & Testing
leadership.gardenยท1d
โš™๏ธProof Engineering
Loading...Loading more...
AboutBlogChangelogRoadmap