🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Shostack + Associates > The Ultimate Beginner's Guide to Threat Modeling
shostack.org·2d
🎯Threat Hunting
AI Agents Are Getting Better at Writing Code—and Hacking It as Well
wired.com·21h
🔓Hacking
Learn – Computer-Aided Instruction on Unix
wolfram.schneider.org·15h·
Discuss: Hacker News
📟Terminal Typography
Show HN: Anagnorisis, local data-management with trainable recommendation engine
github.com·15h·
Discuss: Hacker News
🤖Archive Automation
AST, Bytecode and the In Between: An Exploration of Interpreter Design Tradeoffs
2025.ecoop.org·14h·
Discuss: Hacker News
🔤DSLs
What LLMs Know About Their Users
schneier.com·1d·
Discuss: Hacker News
💻Local LLMs
Why Should AI Review Your Code? Can writer be reviewer also?
getpanto.ai·7h·
Discuss: Hacker News
📏Code Metrics
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.org·2d
🛡️eBPF Security
Quality Assurance Testing Services: Ensuring Excellence in the Digital Era
dev.to·2h·
Discuss: DEV
🕵️Penetration Testing
Complete Overview of Generative & Predictive AI for Application Security
dev.to·3d·
Discuss: DEV
⚡Proof Automation
Entelligence vs CodeRabbit
dev.to·1h·
Discuss: DEV
🌳Incremental Parsing
Exploiting Android Components in Seconds
infosecwriteups.com·4h
⚡Performance Tools
IP Sentry (Golang)
dev.to·1d·
Discuss: DEV
🛡️eBPF Security
Exploring High Efficiency Web Analysis Results(1750876031390300)
dev.to·20h·
Discuss: DEV
🌊Stream Processing
Treasure Case Sharing of HarmonyOS 5 Development — Practical Tips for Application Architecture
dev.to·16h·
Discuss: DEV
🔌Interface Evolution
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.org·10h
🔒Privacy Preserving
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.com·23h
🔓Hacking
Resilience assessment framework for cyber-physical distribution power system based on coordinated cyber-physical attacks under dynamic game
arxiv.org·1d
🤝Consensus Algorithms
Memory Safety in Web Rust System Zero Cost Secure(1750931826373700)
dev.to·4h·
Discuss: DEV
🦀Rust Borrowing
Loading...Loading more...
AboutBlogChangelogRoadmap