๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

Understanding LTPA tokens for accessing a web site.
colinpaice.blogยท6d
๐ŸŽฏNTLM Attacks
Sudo hung for minutes because the system couldn't resolve its own hostname
anagogistis.comยท5dยท
Discuss: Hacker News
๐ŸŒDNS Security
WordPress for Newsrooms
werd.ioยท1dยท
Discuss: Hacker News
๐Ÿ“กRSS Automation
Marketing SaaS apps is going to get 10x harder
substack.comยท1dยท
Discuss: Substack
โš–๏ธFeed Ranking
Von der Leyen flight: Lithuania warns EU of massive GPS interference
heise.deยท1d
๐Ÿ”Polish Cryptanalysis
Measuring cryptographic strength in liters of boiling water
johndcook.comยท5dยท
Discuss: Hacker News
๐ŸŒŠStream Ciphers
Sprouts: Self hosting without sysadmin knowledge
judi.systemsยท5dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
โ€˜So adamant and loudโ€™: Phillies dad explains why he gave angry fan his sonโ€™s home run ball
the-independent.comยท1d
๐Ÿ’ปLocal first
Introducing Databricks Assistant Data Science Agent
databricks.comยท5dยท
Discuss: Hacker News
โš™๏ธBatch Processing
The Design and Regulation of Technology
leapfrog.nlยท1dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
AI-powered meet-up apps fight loneliness
phys.orgยท1d
๐ŸŒCultural Algorithms
OrgChart: Coding Agent Organizations (Open Source)
gpeake.comยท6dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Opinion: Five years after Floyd, civilian police oversight is dying on the vine
mercurynews.comยท2d
๐ŸšจIncident Response
EvolutionAPI/evolution-api
github.comยท2d
๐Ÿ”ŒInterface Evolution
Unnoticeable Community Deception via Multi-objective Optimization
arxiv.orgยท5d
๐Ÿ”ฒCellular Automata
String Theory
nytimes.comยท1d
๐Ÿ“กInformation theory
Cut Costs, Not Accuracy: LLM-Powered Data Processing with Guarantees
arxiv.orgยท4d
๐Ÿ’ปLocal LLMs
Automated Antibiotic Resistance Prediction & Intervention via Multimodal Data Fusion and Reinforcement Learning
dev.toยท3dยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
AnomalyLMM: Bridging Generative Knowledge and Discriminative Retrieval for Text-Based Person Anomaly Search
arxiv.orgยท3d
๐Ÿ”Information Retrieval
Breaking the Mirror: Activation-Based Mitigation of Self-Preference in LLM Evaluators
arxiv.orgยท3d
๐Ÿ’ปProgramming languages
Loading...Loading more...
AboutBlogChangelogRoadmap