🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 NetworkProtocols

TLS, Formal Specification, Protocol State Machines, Verification

Understanding Brotli PDF Compression
pdfa.orgΒ·1d
πŸŒͺ️Brotli
Fake DocuSign email hides tricky phishing attempt
malwarebytes.comΒ·20h
🎫Kerberos Attacks
Modelling API rate limits as diophantine inequalities
vivekn.devΒ·1dΒ·
Discuss: Hacker News
🎯Performance Proofs
OpenDylan sheds some parentheses in 2025.1 update
theregister.comΒ·2dΒ·
Discuss: Hacker News
🧠Lisp Dialects
Flashing a Eufy C-120 Security Camera with custom firmware
blog.vasi.liΒ·19hΒ·
Discuss: Hacker News
🎬Video Codecs
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiΒ·3dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
Show HN: Ethical Hacking and Account Recovery for Hacked Users and Business
news.ycombinator.comΒ·11hΒ·
Discuss: Hacker News
πŸ”Archive Cryptanalysis
Self-Improving CLI Agents in 5 minutes
colinharman.substack.comΒ·21hΒ·
Discuss: Substack
⚑Proof Automation
New rust mocking library Injectorpp 0.4.0 is released! Type check is added and more
reddit.comΒ·4dΒ·
Discuss: r/rust
πŸ¦€Rust Verification
[rant] Rust: The Safety Language That Still Isn’t Safe Enough
dev.toΒ·16hΒ·
Discuss: DEV
πŸ¦€Embedded Rust
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
techradar.comΒ·1d
πŸ”“Hacking
βš™οΈ Scalable and Ordered Queueable Execution from Triggers in Salesforce
dev.toΒ·1dΒ·
Discuss: DEV
🌊Stream Processing
Juris.js: Non-Blocking Rendering: The Game-Changer in Modern Web Development
dev.toΒ·20hΒ·
Discuss: DEV
🌊Stream Processing
MCP Demystified: What Actually Goes Over the Wire??
hackernoon.comΒ·5d
πŸ“ŸVintage Protocols
15 Go Packages Worth Your Time
dev.toΒ·1dΒ·
Discuss: DEV
πŸ’§Liquid Types
The Bug Was One Character Long: Lessons From My First Full Stack App
dev.toΒ·14hΒ·
Discuss: DEV
🌳Incremental Parsing
PsyLite Technical Report
arxiv.orgΒ·1d
πŸ“„Document Digitization
CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation
tenable.comΒ·14h
🎫Kerberos Exploitation
IPv6 and Proxying Enhancements in DragonFly BSD
discoverbsd.comΒ·2d
πŸ›‘οΈeBPF Security
🌐 What Is AWS Networking? (And Why It’s the Backbone of Your Cloud Setup)
dev.toΒ·2dΒ·
Discuss: DEV
πŸ–₯️Self-hosted Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap