🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

'Serpent' exposed online scammers, before he was accused himself
abc.net.au·11h
🎫Kerberos Attacks
Bridging the Runtime Gap: Insights from Frost & Sullivan’s 2025 Cloud / Application Runtime Security Report | Oligo Security
oligo.security·1d
👁️System Observability
Logistic Regression Applied to Baseball Data
runningonnumbers.com·19h·
Discuss: Hacker News
🧮Kolmogorov Bounds
Google Launches OSS Rebuild
tech.slashdot.org·21h
🔓Open Source Software
Attacks on Microsoft Sharepoint: What admins need to do after patching
heise.de·5h
🔓Hacking
Functional Documentation
dzombak.com·21h·
Discuss: Hacker News
📜Proof Carrying Code
ICML 2025 Outstanding Paper Awards
icml.cc·7h·
Discuss: Hacker News
🧠Machine Learning
The Recursive Coherence Principle: A Formal Constraint on Scalable Intelligence, Alignment, and Reasoning Architecture
arxiv.org·7h
🧠Intelligence Compression
Show HN: I'm a non-coder who turns 1-line intents into full-stack blueprints
news.ycombinator.com·23h·
Discuss: Hacker News
🔗Concatenative Programming
Vitalik Buterin's response to AI 2027
vitalik.eth.limo·1d·
Discuss: Hacker News
🔲Cellular Automata
Cyber security of Mega Events: A Case Study of Securing the Digital Infrastructure for MahaKumbh 2025 -- A 45 days Mega Event of 600 Million Footfalls
arxiv.org·1d
🛡Cybersecurity
Forcing Myself to Vibe Code
kevinhighwater.com·1d·
Discuss: Hacker News
⚔️Lean Tactics
Multicloud app that includes DePIN (Demo)
github.com·1d·
Discuss: Hacker News
🔓Open Source Software
Python Error Handling Best Practices: Build Resilient Systems with Advanced Exception Management Techniques
dev.to·2d·
Discuss: DEV
💾Persistence Strategies
Humans can be tracked with unique 'fingerprint' based on how their bodies block Wi-Fi signals
theregister.com·19h·
Discuss: Hacker News
📡Bluetooth Archaeology
Wah_Ter_Mee
hackster.io·1d
📲Digitization
Figgie Auto: An algorithmic sandbox for Jane Street's game, "Figgie"
github.com·21h·
Discuss: Hacker News
🔲Cellular Automata
Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief
unit42.paloaltonetworks.com·1d
🔓Hacking
**Essential Python Security Practices: Advanced Techniques to Protect Your Applications from Threats**
dev.to·2d·
Discuss: DEV
🛡️WASM Security
Beyond the Migration: Optimizing Legacy Code for AI Performance & Scalability
dev.to·2d·
Discuss: DEV
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap