🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“Š PCAP Analysis

Network Captures, Traffic Mining, Connection Tracking, Protocol Dissection

Building Real-Time SMS, WhatsApp and Slack Alerts
thenewstack.ioΒ·6h
🌊Stream Processing
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Using a Bloom Filter to Anonymize Web Server Logs
jamieweb.netΒ·3dΒ·
Discuss: Hacker News
🌸Bloom Filters
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·1d
πŸ”’Bitwise Algorithms
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·1dΒ·
Discuss: Hacker News
πŸ”Systems Hardening
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.comΒ·15h
🦠Malware Analysis
My Homelab (now in a 10" rack)
reddit.comΒ·7hΒ·
Discuss: r/homelab
🏠HomeLab
Exploring High Efficiency Web Analysis Results(1750876031390300οΌ‰
dev.toΒ·5hΒ·
Discuss: DEV
🌊Stream Processing
Ossification and the Internet
blog.apnic.netΒ·17h
πŸ“‘Network Archaeology
The Agentic Protocols That Will Define the Next Decade of Software
anup.ioΒ·2dΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Analysis of Scheduling schemes based on Carrier Aggregation in LTE-Advanced and their improvement
arxiv.orgΒ·19h
πŸ“‘Network Calculus
Probabilistic and reinforced mining of association rules
arxiv.orgΒ·1d
🧠Learned Indexes
Building a Language Server
bullno1.comΒ·2dΒ·
Discuss: Hacker News, r/programming
πŸ—£οΈDomain-Specific Languages
Single Core Hundred Thousand Concurrency(1750866547511600οΌ‰
dev.toΒ·7hΒ·
Discuss: DEV
🌊Stream Processing
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
Open-Set Graph Anomaly Detection via Normal Structure Regularisation
arxiv.orgΒ·2d
🧠Machine Learning
Check out this blog about our hackathon winning project DreamOps!
dev.toΒ·9hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
AI closing the loop, CTI to Simulations and hunting
infosecwriteups.comΒ·1d
🎯Threat Hunting
Building a Scalable WAF Log Pipeline: From AWS WAF to Cortex XDR with CDK
dev.toΒ·1dΒ·
Discuss: DEV
πŸ‘οΈObservatory Systems
[Podcast] Downloading the root
blog.apnic.netΒ·22h
πŸ“‘DNS Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap