🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 NetworkProtocols

TLS, Formal Specification, Protocol State Machines, Verification

ANN: Miso-lynx, create iOS apps with Haskell and LynxJS
github.com·20h·
Discuss: Hacker News
🧠Lisp Dialects
Major updates to JSON Web Proof specifications in preparation for IETF 123
self-issued.info·22h
🔐CBOR
Token Delegation and MCP server orchestration for multi-user AI systems
dev.to·10h·
Discuss: DEV
🌳Archive Merkle Trees
KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery
seclists.org·22h
🎫Kerberos Exploitation
Domain-Driven Refactoring • Alessandro Colla, Alberto Acerbis & Xin Yao • GOTO 2025
youtube.com·8h
🗣️Domain-Specific Languages
Understanding the NCSC’s New API Security Guidance
lab.wallarm.com·9h
📦Container Security
Preventing Reentrancy Bugs From Creeping Back In: Linking TLA+ Models to Rust Code
medium.com·2d·
Discuss: Lobsters
🏛️Agda
RFC 9309 – Robots Exclusion Protocol
datatracker.ietf.org·9h·
Discuss: Hacker News
🌐DNS Security
Decoding TCP SYN for stronger network security
blog.apnic.net·1d
📊PCAP Analysis
Home PoE switch 24ports for cameras and potential vlans- Intellinet
microcenter.com·54m·
Discuss: r/homelab
📟Vintage Protocols
How SSL Certificates Work—and Why They Still Matter
securityscorecard.com·2d
🔐Certificate Analysis
Stacked Intelligent Metasurfaces-Aided eVTOL Delay Sensitive Communications
arxiv.org·16h
🕸️Mesh Networking
Getting Started with NetExec: Streamlining Network Discovery and Access
blackhillsinfosec.com·1d
🔒LDAP Security
Critical Analysis of the Meshtastic Protocol
disk91.com·3h·
Discuss: Hacker News
🕸️Mesh Networking
GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed
unit42.paloaltonetworks.com·2d
🎫Kerberos Exploitation
An Internet Infrastructure Perspective on AI Service Provision
circleid.com·21h
📡DNS Archaeology
The double-edged sword of MCP: Understanding the threat landscape for AI workflows
redcanary.com·5h
🔒Language-based security
Modeling CORS frameworks with CodeQL to find security vulnerabilities
github.blog·3h
✅Format Verification
Specification Grounding: The Missing Link in Vibe Coding
unstract.com·3h·
Discuss: Lobsters, Hacker News
⚙️TLA+
Setting Up Your Own Certificate Authority for Development
isc.sans.edu·1d·
Discuss: Hacker News
🔐Certificate Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap