🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

Rethinking Distributed Computing for the AI Era
cacm.acm.orgΒ·15h
⚑Incremental Computation
Go at american express today
americanexpress.ioΒ·11h
πŸ”ŒInterface Evolution
Garum Sardiniae in Tabula: Rediscovering the Ancient Taste of Roman Cuisine
exarc.netΒ·8hΒ·
Discuss: Hacker News
πŸ“šMARC Archaeology
AI Use Cases That Are Transforming Information Management Today
info.aiim.orgΒ·1d
πŸ“„Document Digitization
14th July – Threat Intelligence Report
research.checkpoint.comΒ·2d
πŸ”“Hacking
Types That Count: Journey across Qualitative and Quantitative Intersection Types
iris.unito.itΒ·2dΒ·
Discuss: Hacker News
πŸ”Type Inference
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.devΒ·2dΒ·
Discuss: Lobsters, Hacker News
🌐Network Protocols
Commodore, Apple, and the early computer days ↦
sixcolors.comΒ·1dΒ·
Discuss: Hacker News
πŸ’Ύvintage computing
vanhauser-thc/thc-hydra
github.comΒ·4d
πŸ›‘οΈeBPF Security
I was wrong about robots.txt
evgeniipendragon.comΒ·9hΒ·
Discuss: Lobsters, Hacker News
πŸ”—Online Curation
Artisanal Handcrafted Git Repositories
drew.silcock.devΒ·14hΒ·
Discuss: Lobsters, Hacker News
🌳Git Internals
Developer loses $500k via malicious Cursor Extension
kaspersky.comΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Show HN: OrioleDB Beta12 Features and Benchmarks
orioledb.comΒ·1dΒ·
Discuss: Hacker News
πŸ—ƒοΈDatabase Storage
North Korean XORIndex malware hidden in 67 malicious npm packages
bleepingcomputer.comΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ“¦Package Managers
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comΒ·1d
πŸ”“Hacking
Check out my mess...
reddit.comΒ·8hΒ·
Discuss: r/homelab
🏠Homelab Archaeology
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgΒ·6h
πŸ•΅οΈVector Smuggling
Inside the deepfake threat that’s reshaping corporate risk
techradar.comΒ·3h
πŸ”“Hacking
Where Security Begins: 5 Insights from the Intersection of Engineering and Teaching
hackernoon.comΒ·17h
πŸ›‘Cybersecurity
Are Vision Foundation Models Ready for Out-of-the-Box Medical Image Registration?
arxiv.orgΒ·6h
πŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap