🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

Setting Discord status from physical GameCube console
sethmlarson.dev·1d·
Discuss: Lobsters
🎮Gameboy Emulation
Submatrix Cloud Phone × Reddit Communities
news.ycombinator.com·5h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Open-Source Security Paradox: More Code, More Validation
onekey.so·1h·
Discuss: Hacker News
🔓Open Source Software
Early Desktop Publishing Tools That Didn't Make It
tedium.co·20h·
Discuss: Hacker News
💾vintage computing
I created an mini enclosed rack with a "hot/cold aisle"
tombuildsstuff.blogspot.com·1d·
Discuss: r/homelab
🏠HomeLab
MCNP-GO: A python package for assembling MCNP input files with a systems engineering approach
arxiv.org·7h
📦METS Packaging
Stalkerware firm gets scooped by SQL-slinging security snoop
theregister.com·2d
🔓Hacking
zkSDK: Streamlining zero-knowledge proof development through automated trace-driven ZK-backend selection
arxiv.org·7h
🧮Z3 Solver
When Data-Free Knowledge Distillation Meets Non-Transferable Teacher: Escaping Out-of-Distribution Trap is All You Need
arxiv.org·1d
💻Local LLMs
Prompt Injection, Jailbreaking, and LLM Risks | AI Security series
dev.to·8h·
Discuss: DEV
🔓Hacking
AI Agent Smart Contract Exploit Generation
arxiv.org·7h
🧪Protocol Fuzzing
Adversarial Machine Learning Attacks on Financial Reporting via Maximum Violated Multi-Objective Attack
arxiv.org·7h
🔍BitFunnel
CVE-2025-5777: CitrixBleed 2 Exploit Deep Dive
horizon3.ai·1d·
Discuss: Hacker News
🌐DNS Security
Hidden Prompts in Manuscripts Exploit AI-Assisted Peer Review
arxiv.org·7h
📄PDF Archaeology
Rectifying Adversarial Sample with Low Entropy Prior for Test-Time Defense
arxiv.org·1d
✅Verification Codecs
UVOSAM: A Mask-free Paradigm for Unsupervised Video Object Segmentation via Segment Anything Model
arxiv.org·7h
🎬AV1 Encoding
DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning
arxiv.org·7h
🔐Homomorphic Encryption
Efficient Quantum Access Model for Sparse Structured Matrices using Linear Combination of Things
arxiv.org·1d
⚛️Quantum Algorithms
Think Your Business Messages Are Private? Think Again
hackernoon.com·2d
🏺Protocol Archaeology
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing
arxiv.org·7h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap