๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ก Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Discovering the Discovery of Designated Resolvers
labs.ripe.netยท1d
๐ŸŒDNS Security
Introducing Dynamic API Scanning
blog.detectify.comยท1d
๐Ÿ“ฆContainer Security
Three Lazarus RATs coming for your cheese
blog.fox-it.comยท2d
๐ŸŽซKerberos Exploitation
How to Discover the Binary System as a Child โ€ข Simon Peyton Jones & Chelsea Troy โ€ข GOTO 2025
youtube.comยท2d
โš”๏ธLean Tactics
Finding 1,000 exposed AI servers took researchers 10 minutes
tailscale.comยท12h
๐Ÿ“ŠHomelab Monitoring
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.comยท20hยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Hexstrike-AI: When LLMs Meet Zero-Day Exploitation
blog.checkpoint.comยท1d
๐Ÿค–Network Automation
How EdDSA Vulnerability Exposed Private Keys in Popular Libraries
hackernoon.comยท1d
๐Ÿ”Quantum Security
Why Rewriting Emacs Is Hard
kyo.iroiro.partyยท10hยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ“Concrete Syntax
Normalisation of SWIFT Message Counterparties with Feature Extraction and Clustering
arxiv.orgยท2d
โš™๏ธABNF Mining
Announcing the Rust Innovation Lab
lwn.netยท9h
๐Ÿฆ€Rust Borrowing
Unnoticeable Community Deception via Multi-objective Optimization
arxiv.orgยท22h
๐Ÿ”ฒCellular Automata
Who Owns, Operates, and Develops Your VPN Matters
opentech.fundยท9hยท
Discuss: Hacker News
๐Ÿง…Tor Networks
Black Hat Training Attendees Scan Aviation Organization
blogs.cisco.comยท14h
๐ŸŽฏThreat Hunting
Carolina Codes 2025: My First-Time Speaker Experience
dev.toยท15hยท
Discuss: DEV
โš™๏ธProof Engineering
100,000,000 CROWPOWER and no horses on the moon
taylor.townยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ”ฒCellular Automata
Over 20 VPN apps with 700 million users found to have undisclosed links and security vulnerabilities
techradar.comยท1d
๐ŸŒBGP Security
IoT-Powered Wood Fence Monitoring Using Python Frameworks
dev.toยท5hยท
Discuss: DEV
๐Ÿ Home Automation
Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
wired.comยท4hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Thermoptic โ€“ HTTP proxy which cloaks requests as Chrome across all stack layers
github.comยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap