🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Radicle Collaborative Objects
radicle.xyz·2d
📦Content Addressing
Bypassing dnsmasq dhcp-script limitations for command execution in config injection attacks
blog.nns.ee·1d
🌐DNS Security
Rumble in the jungle: APT41’s new target in Africa
securelist.com·4d
🎫Kerberos Exploitation
The Caldera-Microsoft Lawsuit of 1996
dfarq.homeip.net·1d·
Discuss: Hacker News
🔓Open Source Software
Neo Geo ROM Hacking: SMA Encrypted P ROMs
mattgreer.dev·1d·
Discuss: Hacker News
📼Retro Games
Administrator of Major Dark Web Cybercrime Forum Arrested In Ukraine
yro.slashdot.org·2d
🔓Hacking
Acquaintance of suspect in Taylor Swift concert plot convicted at trial in Austria
the-independent.com·13h
🎵Audio Steganography
Event Sourcing as the Backbone of AI Memory
tracardi.com·1d·
Discuss: Hacker News
⚡Incremental Computation
Court Battles Spark an Unexpected AI Movement: Fairness by Design
hackernoon.com·1d
🌊Stream Processing
Optimizing Tool Selection in LLM Workflows(Part 2): A DSPy and PyTorch Benchmark
viksit.substack.com·2d·
Discuss: Substack
✨Effect Handlers
Benchmarking Amazon Nova: A comprehensive analysis through MT-Bench and Arena-Hard-Auto
aws.amazon.com·1d
🎙️Whisper
New Tool: ficheck.py, (Thu, Jul 24th)
isc.sans.edu·1d
✅Archive Fixity
Major breach sees 100 million data records on citizens leaked - here's what we know
techradar.com·1d
✈️Datasaab Archaeology
Stop coding. Start architecting. Introducing Serverokey — a Node.js engine for the AI era.
dev.to·11h·
Discuss: DEV
🔌Interface Evolution
VERIRAG: Healthcare Claim Verification via Statistical Audit in Retrieval-Augmented Generation
arxiv.org·22h
⚡Proof Automation
Revolutionizing Business Automation with AssemblyAI Voice Agents: Building Ultra-Fast, Ultra-Accurate Voice-Driven Workflows
dev.to·9h·
Discuss: DEV
🌊Stream Processing
E-Commerce System Powered by Redis: Beyond the Cache
dev.to·42m·
Discuss: DEV
⚡Redis Internals
Decentralized Identity Isn’t Coming from Silicon Valley. It’s Coming from Africa
hackernoon.com·20h
🔐PKI Archaeology
How to detect click farm fraud in 2025
fingerprint.com·9h
🦠Malware Analysis
post quantum cryptography in a K8s ingress controller?
reddit.com·3d·
Discuss: r/kubernetes
🏠Homelab Federation
Loading...Loading more...
AboutBlogChangelogRoadmap