🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ LDAP Enumeration

Directory Mining, Attack Vectors, Domain Investigation, Enterprise Security

On This Day in Math - August 20
pballew.blogspot.com·3h·
Discuss: www.blogger.com
📐Mathematical Art
Swift Concurrency's Biggest Unintuitive Gotchas
blog.jacobstechtavern.com·16h
📞Session Types
How Tenable Moved From Siloed Security to Exposure Management
tenable.com·1d
🎯Threat Hunting
OpenAVMKit: A Free and Open Source real estate valuation library for Python
progressandpoverty.substack.com·1d·
Discuss: Substack
🤖Archive Automation
Victory! Pen-Link's Police Tools Are Not Secret
eff.org·1d
⚖️Digital Evidence
The EU Commission's gross violation of privacy – endangering encryption (2022)
politico.eu·16h·
Discuss: Hacker News
🔐Archive Encryption
How "special register groups" invaded computer dictionaries for decades
righto.com·16h·
Discuss: Hacker News
🏛️BESM Computers
The joy of recursion, immutable data, and pure functions: Generating mazes with JavaScript
jrsinclair.com·1d·
Discuss: Hacker News
λLambda Formalization
ECUre: The AI-Powered Guardian Securing Your Car's Electronic Control Units from Malware
hackernoon.com·16h
🦀Embedded Rust
Creating AI agent solutions for warehouse data access and security
engineering.fb.com·6d
🔐Capability Systems
Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality
seclists.org·1d
📦Deflate
Open Compute Project’s Universal D2D Link Layer with UCIe Enables Silicon Diversity in AI Clusters
dev.to·1h·
Discuss: DEV
🖥️Terminal Renaissance
OneUptime – open-source observability platform
github.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Software Test Advisory Services: Strategic QA for Complex Digital Environments
dev.to·1h·
Discuss: DEV
🔍Concolic Testing
Hyperdimensional Semantic Mapping for Automated Historical Narrative Reconstruction
dev.to·15h·
Discuss: DEV
🕸️Hypertext Archaeology
Modeling GRNs with a Probabilistic Categorical Framework
arxiv.org·3h
✨Effect Handlers
Categorical Policies: Multimodal Policy Learning and Exploration in Continuous Control
arxiv.org·3h
🔲Cellular Automata
Piciorgros TMO-100: Unauthorized log data access
seclists.org·1d
🛡️eBPF Security
Hell or High Water: Evaluating Agentic Recovery from External Failures
arxiv.org·2d
🛡️Error Boundaries
Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems
securityaffairs.com·3d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap