๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—๏ธ Paleocryptography

Historical Ciphers, Medieval Encryption, Manuscript Analysis, Archaeological Cryptanalysis

New Processing Archivist
libraries.uh.eduยท21h
๐Ÿ”„Archival Workflows
Counting with Categories (Part 3)
golem.ph.utexas.eduยท2d
ฮปLambda Formalization
Lunar Spider โ€“ Lotus V2 Loader Campaign Using Fake CAPTCHA Delivery and DLL Sideloading
research.kudelskisecurity.comยท4h
๐ŸŽซKerberos Exploitation
Reflecting JSON into C++ Objects
brevzin.github.ioยท1dยท
Discuss: Lobsters, Hacker News, r/cpp, r/programming
๐Ÿ”งBinary Parsers
Orange Me2eets: We made an end-to-end encrypted video calling app and it was easy
blog.cloudflare.comยท23hยท
Discuss: Hacker News, Hacker News
๐Ÿ“žWebRTC
Navy SEALs, Performance vs. Trust, and AI
mljar.comยท1dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
CR1632: Hogwartsโ€™ Unseen Power Charm for Keys, Castles & Cosmic Journeys
dev.toยท7hยท
Discuss: DEV
๐Ÿ”’Hardware Attestation
How to Fix Your Context
dbreunig.comยท22hยท
Discuss: Hacker News
โœจEffect Handlers
Deadly Risks: 5 Crypto Entrepreneurs and Investors Who Paid the Ultimate Price
hackernoon.comยท1d
๐ŸŽซKerberos Attacks
DigitalOcean Fundamentals: API
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
New hybrid quantumโ€“classical computing approach used to study chemical systems
phys.orgยท1d
โš›๏ธQuantum Algorithms
Introduction to Algorithms: What They Are and Why They Matter
dev.toยท3dยท
Discuss: DEV
๐ŸงฎKolmogorov Complexity
A Geometric Square-Based Approach to RSA Integer Factorization
arxiv.orgยท3d
๐Ÿ”ฑGalois Cryptography
Curriculum-Guided Antifragile Reinforcement Learning for Secure UAV Deconfliction under Observation-Space Attacks
arxiv.orgยท9h
๐ŸŽฏThreat Hunting
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgยท3d
๐Ÿ”—Hash Chains
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.comยท1d
๐ŸŽฏThreat Hunting
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.orgยท4d
๐Ÿ”’Language-based security
Secure Energy Transactions Using Blockchain Leveraging AI for Fraud Detection and Energy Market Stability
arxiv.orgยท1d
๐ŸคConsensus Algorithms
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท2d
๐Ÿ”NTLM Forensics
Data Visualization for Improving Financial Literacy: A Systematic Review
arxiv.orgยท9h
๐ŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap