🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

IPv6 and Proxying Enhancements in DragonFly BSD
discoverbsd.com·2h
🛡️eBPF Security
Shostack + Associates > The Ultimate Beginner's Guide to Threat Modeling
shostack.org·2d
🎯Threat Hunting
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.io·1d
💻Local LLMs
Show HN: Anagnorisis, local data-management with trainable recommendation engine
github.com·11h·
Discuss: Hacker News
🤖Archive Automation
AI Agents Are Getting Better at Writing Code—and Hacking It as Well
wired.com·17h
🔓Hacking
AST, Bytecode and the In Between: An Exploration of Interpreter Design Tradeoffs
2025.ecoop.org·9h·
Discuss: Hacker News
🔤DSLs
What LLMs Know About Their Users
schneier.com·23h·
Discuss: Hacker News
💻Local LLMs
Why Should AI Review Your Code? Can writer be reviewer also?
getpanto.ai·3h·
Discuss: Hacker News
📏Code Metrics
Structured Logging in NextJS with OpenTelemetry
dev.to·1h·
Discuss: DEV
📝Log Parsing
Flame Graph Performance Truth Analysis(1750839255230100)
dev.to·1d·
Discuss: DEV
⚡Performance Tools
PasteTrace: A Single Source Plagiarism Detection Tool For Introductory Programming Courses
arxiv.org·2d
🔗Document Similarity
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.org·2d
💻Local LLMs
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.org·2d
🛡️eBPF Security
Complete Overview of Generative & Predictive AI for Application Security
dev.to·3d·
Discuss: DEV
⚡Proof Automation
IP Sentry (Golang)
dev.to·1d·
Discuss: DEV
🛡️eBPF Security
Exploring High Efficiency Web Analysis Results(1750876031390300)
dev.to·15h·
Discuss: DEV
🌊Stream Processing
Treasure Case Sharing of HarmonyOS 5 Development — Practical Tips for Application Architecture
dev.to·11h·
Discuss: DEV
🔌Interface Evolution
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·20h·
Discuss: DEV
🧠Machine Learning
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.org·6h
🔒Privacy Preserving
Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.com·19h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap