๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

Interacting With Text Adventures Through Perl
entropicthoughts.comยท1d
๐Ÿ“ŸTerminals
Aeroflot grounded by 'crippling cyberattack' as Silent Crow takes credit
metacurity.comยท1d
๐Ÿ”“Hacking
Show HN: Claude Code Subagents Directory
subagents.ccยท14hยท
Discuss: Hacker News
๐ŸงฉWASM Components
ChatGPT can be a disaster for lawyers โ€” Robin AI says it can fix that
theverge.comยท1d
โšกProof Automation
Launch SaaS Faster โ€“ Production-Ready
launchboilerplate.comยท22hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
A Privacy-Preserving UK Postcode Lookup Tool
github.comยท14hยท
Discuss: Hacker News
๐Ÿ“ฑQR Archaeology
Retiring Docker Content Trust
docker.comยท13h
๐Ÿ“ฆContainer Security
You Are the Bios Now: Building a Hypervisor in Rust with KVM
yeet.cxยท14hยท
Discuss: Hacker News, r/programming
๐ŸงฒRISC-V Preservation
Mitigation of Social Media Platforms Impact on the Users
arxiv.orgยท2h
๐ŸคSecure Multiparty
Fine-Tuning vs RAG โ€“ How to Choose the Right Approach to Training LLMs on Your Data
hackernoon.comยท20h
๐Ÿ“ŠFeed Optimization
I Was So Angry, I Built My Own Workshop Platform
dev.toยท8hยท
Discuss: DEV
๐Ÿ”“Open Source Software
ZIUM: Zero-Shot Intent-Aware Adversarial Attack on Unlearned Models
arxiv.orgยท2h
๐Ÿ‘๏ธPerceptual Hashing
CleANN: Efficient Full Dynamism in Graph-based Approximate Nearest Neighbor Search
arxiv.orgยท1d
๐Ÿ—‚๏ธVector Databases
The vibe vulnerability
aardvark.co.nzยท1d
๐Ÿ”“Hacking
Knowledge-Guided Memetic Algorithm for Capacitated Arc Routing Problems with Time-Dependent Service Costs
arxiv.orgยท2h
๐Ÿ”—Topological Sorting
MCP Context Forge Gateway โ€” Try it now! โšก
dev.toยท4dยท
Discuss: DEV
๐Ÿ Homelab Archaeology
An LLM Driven Agent Framework for Automated Infrared Spectral Multi Task Reasoning
arxiv.orgยท2h
๐ŸŒˆSpectroscopy
Muddled Libra: From Social Engineering to Enterprise-Scale Disruption
paloaltonetworks.comยท3d
๐Ÿ”“Hacking
The Stanford Framework That Turns AI into Your PM Superpower
towardsdatascience.comยท1d
๐Ÿ”Capability Systems
Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap