๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

PLOS One slaps four papers with expressions of concern for overlapping control data
retractionwatch.comยท22h
๐ŸงฌCopy Number Variants
A better for loop?
cirw.inยท1d
๐Ÿฆ€Rust Macros
Linkdump No 69
82mhz.netยท1d
๐Ÿ•น๏ธRetro Gaming
Ruby for Good
ti.toยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
VPS on Your Home Network
eliebaier.chยท4dยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
We Needed Better Cloud Storage for Python So We Built Obstore
developmentseed.orgยท5dยท
Discuss: Lobsters, Hacker News
๐Ÿ”„Sync Engine
UPS for Nas devices
forums.anandtech.comยท1d
๐Ÿ Homelab Preservation
What a study of people who believe conspiracy theories told us about why they spread
the-independent.comยท1d
๐Ÿ”ŽOSINT Techniques
Some key facts about passkeys and how they work
sixcolors.comยท5dยท
Discuss: Hacker News, Hacker News
๐ŸŽฏNTLM Attacks
Customizing Lisp REPLs
aartaka.meยท5dยท
Discuss: Lobsters, Hacker News, Hacker News, r/programming
๐ŸšNordic Shell
I wasn't taught Git in school
youtube.comยท1dยท
Discuss: r/programming
๐ŸŒณGit Internals
Former employee accuses Meta of inflating ad metrics and sidestepping rules
techspot.comยท1d
๐Ÿ“กRSS
Endless Wiki - A useless self-hosted encyclopedia driven by LLM hallucinations
github.comยท1dยท
Discuss: Hacker News, r/selfhosted
๐Ÿ•ธ๏ธKnowledge Graphs
GEN2: A Generative Prediction-Correction Framework for Long-time Emulations of Spatially-Resolved Climate Extremes
arxiv.orgยท1d
โšกIncremental Computation
Where Hurricanes Hit Hardest: A County-Level Analysis with Python
towardsdatascience.comยท1d
๐Ÿ”ถVoronoi Diagrams
Predictive Maritime Asset Valuation via Dynamic Network Embedding & Bayesian Optimization
dev.toยท18hยท
Discuss: DEV
๐Ÿ”Vector Forensics
Piciorgros TMO-100: Unauthorized log data access
seclists.orgยท4d
๐Ÿ›ก๏ธeBPF Security
Real-Time Seismic Vulnerability Assessment of Historic Masonry Bridges via Machine Learning and Finite Element Iteration
dev.toยท2dยท
Discuss: DEV
๐ŸบComputational Archaeology
Celebrating 10+ years of device intelligence & fraud prevention
fingerprint.comยท3d
๐Ÿ”—Binary Similarity
Types of Advocates in India | Private vs Government Lawyers Explained
dev.toยท6hยท
Discuss: DEV
๐Ÿ Personal Archives
Loading...Loading more...
AboutBlogChangelogRoadmap