๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” NTLM Archaeology

Windows Authentication History, Domain Forensics, Hash Analysis, Legacy Protocols

How IT leaders infuse cyber hygiene into daily work
cybersecuritydive.comยท1d
๐Ÿ›กCybersecurity
Seashell Architecture
lumafield.comยท13hยท
Discuss: Hacker News
๐ŸฆดBinary Paleontology
Tech Resume and Interview Tips from a Hiring Manager Perspective
ravelantunes.comยท1dยท
Discuss: Hacker News
๐ŸŽฏRecommendation Metrics
Python Morsels: Don't call dunder methods
pythonmorsels.comยท4h
๐Ÿ”ขDenotational Semantics
User privacy app Cloaked adds AI-powered caller screening
techcrunch.comยท13h
๐Ÿ”คEBCDIC Privacy
I Watched Gemini CLI Hallucinate and Delete My Files
anuraag2601.github.ioยท9hยท
Discuss: Hacker News
โ›๏ธFile Carving
Firefox 141 introduces local AI to help with tab management
ghacks.netยท23h
๐ŸŒWeb Standards
Managed IT Services by Seashore Solutions
dev.toยท21hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Responsible AI in Enterprise Applications: A Practitioner's View
jjude.comยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ”Capability Systems
Internal Chat Logs of Ransomware Group Leaked
cacm.acm.orgยท1d
๐Ÿ”“Hacking
NATS with JetStream
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
ExpressVPN fixes security bug in Windows apps โ€“ here's all you need to know
techradar.comยท12h
๐ŸบKerberos Archaeology
Development and Deployment of Hybrid ML Models for Critical Heat Flux Prediction in Annulus Geometries
arxiv.orgยท1d
๐Ÿง Machine Learning
HTTP Requests in Go: Only The Most Useful Libraries
dev.toยท1dยท
Discuss: DEV
โšกgRPC
IPFire 2.29 Core Update 196 Firewall Released with WireGuard Boost
linuxiac.comยท15h
๐Ÿ”eBPF
A vibe coding horror story: Started as 'a pure dopamine hit' ended a nightmare
zdnet.comยท12hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
BIDWESH: A Bangla Regional Based Hate Speech Detection Dataset
arxiv.orgยท29m
๐ŸŒ€Brotli Dictionary
P-CoT: A Pedagogically-motivated Participatory Chain-of-Thought Prompting for Phonological Reasoning in LLMs
arxiv.orgยท29m
๐Ÿค–Grammar Induction
eslint-config-prettier Compromised: How npm Package with 30 Million Downloads Spread Malware
safedep.ioยท1dยท
Discuss: Hacker News, Hacker News, r/opensource, r/programming
๐Ÿ’ฃZIP Vulnerabilities
Why Startups Are Betting Everything on Apache DataFusion
thenewstack.ioยท9h
๐ŸŒŠApache Kafka
Loading...Loading more...
AboutBlogChangelogRoadmap