🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Quantum physics protects videos from prying eyes and tampering
space.com·1d
⚛️Quantum Tape
Code rant: The Configuration Complexity Clock
mikehadlow.blogspot.com·8h
🔌Interface Evolution
The EU's Plan to Kill Private Messaging
europeanconservative.com·16h·
Discuss: Hacker News
🧅Tor Networks
Software flies airplanes. And sometimes software fails (2010)
softwarefreedom.org·3d·
Discuss: Hacker News
💾Persistence Strategies
Received a Mysterious Package with a QR Code? Don't Scan It
pcmag.com·1d·
Discuss: Hacker News
🔓Hacking
A Love Letter to My Future Employer
catzkorn.dev·8h·
Discuss: Hacker News
🐚Shell Calculus
Spatio-temporal indexing the Bluesky firehose
joelgustafson.com·19h·
Discuss: Hacker News
🗃️Database Storage
Coding in the Red-Queen Era
corecursive.com·2d
📏Code Metrics
Machine learning model helps scientists understand deadly cone snail toxins
phys.org·2d
🧠Machine Learning
I built a YouTube downloader after my old favorite site became unusable
dev.to·3h·
Discuss: DEV
🏺ZIP Archaeology
5 Python Libraries I Wish I'd Found Sooner
hackernoon.com·2d
🌳Incremental Parsing
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
darkreading.com·1d
🚀Indie Hacking
Exploring the Future of AI with AI X Collection: Your Ultimate Hub for Advanced AI Tools
dev.to·13h·
Discuss: DEV
🤖AI Curation
UniFGVC: Universal Training-Free Few-Shot Fine-Grained Vision Classification via Attribute-Aware Multimodal Retrieval
arxiv.org·1d
📊Learned Metrics
NVSpeech: An Integrated and Scalable Pipeline for Human-Like Speech Modeling with Paralinguistic Vocalizations
arxiv.org·1d
🎙️Whisper
Hierarchical Verification of Speculative Beams for Accelerating LLM Inference
arxiv.org·1d
💻Local LLMs
What Is The Best Language 🏆for AI Engineering❓
dev.to·1d·
Discuss: DEV
🔩Systems Programming
SGDFuse: SAM-Guided Diffusion for High-Fidelity Infrared and Visible Image Fusion
arxiv.org·10h
🌈Color Science
How to Manage Security Vulnerabilities Using Budibase—No Code Required
hackernoon.com·2d
🗄️Database Internals
Measuring Dependencies between Biological Signals with Temporal Self-supervision, and its Limitations
arxiv.org·2d
📈Mutual Information
Loading...Loading more...
AboutBlogChangelogRoadmap