🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ—οΈ Paleocryptography

Historical Ciphers, Medieval Encryption, Manuscript Analysis, Archaeological Cryptanalysis

Scales as Multipermutations of 0 and 1 into Twelve Places
petecorey.comΒ·1hΒ·
Discuss: Lobsters
🎼Audio Lambda Calculus
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·13h
πŸ“Concrete Syntax
North Korea - Cyber Threat Actor Profile
cstromblad.comΒ·1h
πŸ‡ΈπŸ‡ͺNordic Cryptography
Snake Venom, Urine, and a Quest to Live Forever: Inside a Biohacking Conference Emboldened by MAHA
wired.comΒ·9h
πŸ”“Hacking
Small language model for secrets detection
wiz.ioΒ·2dΒ·
Discuss: Hacker News
πŸ’»Local LLMs
Single-molecule magnet could lead to stamp-sized hard drives capable of storing 100 times more data
phys.orgΒ·4h
βš›οΈQuantum Tape
On This Day in Math - June 23
pballew.blogspot.comΒ·2dΒ·
Discuss: www.blogger.com
Ξ»Lambda Encodings
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.comΒ·21h
🎫Kerberos Exploitation
Networking for Systems Administrators
mwl.ioΒ·6hΒ·
Discuss: Hacker News
🌐DNS over QUIC
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.orgΒ·4h
🎯Threat Hunting
Which operating system was targeted by the first ever mobile phone virus?
techspot.comΒ·1h
πŸ”“Hacking
Unfolding the Past: A Comprehensive Deep Learning Approach to Analyzing Incunabula Pages
arxiv.orgΒ·1d
πŸ€–Manuscript AI
A guide book for a time traveler
uniqueatpenn.wordpress.comΒ·4h
πŸ›Digital humanities
Why document-borne malware needs to be back on the radar for organization
techradar.comΒ·1d
πŸ”“Hacking
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteΒ·1dΒ·
Discuss: Hacker News
🧲RISC-V Archaeology
Counting with Categories (Part 3)
golem.ph.utexas.eduΒ·1d
Ξ»Lambda Formalization
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing Oracle for DeFi
arxiv.orgΒ·15h
πŸ”—Hash Chains
The Inefficiency in Digital Forensics
cyb3rops.medium.comΒ·2d
🚨Incident Response
Loading...Loading more...
AboutBlogChangelogRoadmap