🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

PentestJudge: Judging Agent Behavior Against Operational Requirements
arxiv.org·8h
🎯Threat Hunting
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.io·21h·
Discuss: Hacker News
🧪Binary Fuzzing
Stop using assert in your Python code
nocomplexity.com·2h
🧪Property-Based Testing
DNS at IETF 123
potaroo.net·13h
🌐DNS Security
I Spent $500 To Test Devin For Prompt Injection So That You Don't Have To
embracethered.com·3h
🧮Z3 Solver
Nonsense and Malicious Packages: LLM Hallucinations in Code Generation
cacm.acm.org·16h
🔓Hacking
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.com·13h
🌐DNS Security
Analysing Snapshot Isolation
muratbuffalo.blogspot.com·22h·
Discuss: www.blogger.com
🌳Persistent Data Structures
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·1d
✅Archive Validation
Flaky tests due to bad randomness?
gaultier.github.io·2d
🧪Binary Fuzzing
Using Closures to Extend Class Behavior Without Breaking Encapsulation
hackernoon.com·16h
🔬Refinement Types
U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·5h
🛡Cybersecurity
️‍♂️ Tracking AgentTesla: Real-World Malware Behavior Analysis Using Joe Sandbox
infosecwriteups.com·1d
🦠Malware Analysis
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·2d
⚗️Algebraic Coding
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Those Titles the AI Bot Thought I Had Written
bsdly.blogspot.com·1d·
Discuss: bsdly.blogspot.com
🧪Archive Fuzzing
BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.org·8h
🛡️eBPF Security
Introducing luzer, a coverage-guided Lua fuzzing engine
bronevichok.ru·1d·
Discuss: Lobsters, Hacker News
🧪Binary Fuzzing
How Secure Is Your AI? Exploring Adversarial Attacks, Data Poisoning & ML Penetration Testing
dev.to·1h·
Discuss: DEV
🔍Vector Forensics
Context Engineering — A Comprehensive Hands-On Tutorial with DSPy
towardsdatascience.com·7h
✨Effect Handlers
Loading...Loading more...
AboutBlogChangelogRoadmap