🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ•΅οΈ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

NextDNS adds an option to bypass age verification on websites
ghacks.netΒ·1dΒ·
Discuss: r/Piracy
🌐DNS over QUIC
Agentless vs. Agent-Based Security: A Full Comparison
boostsecurity.ioΒ·2d
πŸ’ΎPersistence Strategies
Vibe Check β„–39
daverupert.comΒ·5h
⭐Awesome lists
Derivatives, Gradients, Jacobians and Hessians – Oh My!
blog.demofox.orgΒ·23hΒ·
Discuss: Hacker News
πŸŒ€Differential Geometry
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations, (Thu, Aug 14th)
isc.sans.eduΒ·3d
πŸ“ΌCassette Hacking
Zomro Promo Code: zomro_405666 - Unlock Incredible Savings on Hosting Plans
dev.toΒ·19hΒ·
Discuss: DEV
🏠HomeLab
Afforai Promo Code β€œARCHANA” – Unlock Exclusive Savings and Benefits
dev.toΒ·14hΒ·
Discuss: DEV
πŸŽ›οΈFeed Filtering
CISA Warns N-able Bugs Under Attack, Patch Now
darkreading.comΒ·3d
πŸ”“Hacking
Managed IT Solutions for Small Businesses: The Smart Path to Growth and Security
dev.toΒ·20hΒ·
Discuss: DEV
πŸ–₯️Self-hosted Infrastructure
Show HN: Wrote a small tool that turns PDFs and docs into fine-tuning datasets
github.comΒ·3dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
Build a Real-World IROPS Re-accommodation Workflow with KaibanJS
dev.toΒ·4dΒ·
Discuss: DEV
🌊Streaming Systems
I Built an Honest AI Agent to Fight Hallucinations. Here's How It Works.
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”²Cellular Automata
Automated Defect Classification via Hierarchical Multi-Scale Feature Extraction for Logic BIST
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”FPGA Verification
Real-Time Multi-Sensor Fusion for Dynamic Anomaly Detection in Autonomous Construction Sites
dev.toΒ·3dΒ·
Discuss: DEV
🏺Computational Archaeology
Enhanced Microstructure Control in TiAlN Coatings via Dynamic Electron Beam Scanning Patterns
dev.toΒ·17hΒ·
Discuss: DEV
πŸ“„Document Digitization
Title: Meta's Approach to Superintelligence: Keeping Control with AI Models
dev.toΒ·1dΒ·
Discuss: DEV
πŸ€–AI Curation
Automated Vulnerability Prioritization via Knowledge Graph Reasoning & Reinforcement Learning
dev.toΒ·6dΒ·
Discuss: DEV
🎯Threat Hunting
10 Latest GitHub Repos for AI Engineers in 2025
dev.toΒ·22hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
ParallelSearch: Train your LLMs to Decompose Query and Search Sub-queries in Parallel with Reinforcement Learning
arxiv.orgΒ·3d
πŸ”Information Retrieval
Your RAG is Basic. Here's the KG-RAG Pattern We Used to Build a Real AI Agent.
dev.toΒ·3dΒ·
Discuss: DEV
πŸ•ΈοΈNeo4j
Loading...Loading more...
AboutBlogChangelogRoadmap