🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 NetworkProtocols

TLS, Formal Specification, Protocol State Machines, Verification

Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·8h·
Discuss: DEV
🌐Network Protocols
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·1h
🦠Malware Analysis
SSL and TLS Deployment Best Practices
github.com·15h·
Discuss: Hacker News
🔐Certificate Analysis
Testing OSPF Device Configurations
blog.ipspace.net·7h
📡Network Protocol Design
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·17h·
Discuss: Hacker News
🕸️WebP Analysis
Shrinking the Generation-Verification Gap with Weak Verifiers
arxiv.org·1d
🧪CBOR Fuzzing
How To Prepare Your API for AI Agents
thenewstack.io·26m
🔌Interface Evolution
Ossification and the Internet
blog.apnic.net·7h
📡Network Archaeology
What Is HTTPS and Why Is It Still Essential for Cybersecurity in 2025?
securityscorecard.com·18h
🌐Network Security
Networking for Systems Administrators
mwl.io·1h·
Discuss: Hacker News
🌐DNS over QUIC
Building a Language Server
bullno1.com·1d·
Discuss: Hacker News, r/programming
🗣️Domain-Specific Languages
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.com·1h
🔒Hardware Attestation
simplex-chat/simplexmq
github.com·12h
🔌Interface Evolution
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.org·1d
🛡Cybersecurity
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·7h
📋Protocol Buffers
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·23h
🛡️eBPF Security
Envoy Proxy Is a Swiss Army Knife
adityarohilla.com·1d·
Discuss: Hacker News
📦Container Security
The Guide to the Foundation Models Framework
azamsharp.com·30m·
Discuss: Hacker News
λLambda Formalization
Gabrl: Securing Commmuniction
gabrl.com·1d·
Discuss: Hacker News
🔐Quantum Security
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·15h
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap