🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.org·32m
🔍Vector Forensics
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systems·13h·
Discuss: Lobsters, Hacker News, r/programming
📞Session Types
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.com·12h
👁️System Observability
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·1d
🔓Password Cracking
Guessing Game: Haskell Style
entropicthoughts.com·1d
👑Dependent Haskell
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·16h
✅Format Verification
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.com·14h
🕵️Domain Enumeration
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.net·14h
🦀Rust Macros
What is SAST and DAST? Key Differences Explained
boostsecurity.io·1d
🕵️Penetration Testing
Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
blog.cloudflare.com·14h·
Discuss: Hacker News
🌐DNS Security
Citrix fixed three NetScaler flaws, one of them actively exploited in the wild
securityaffairs.com·9h
🌐DNS Security
Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.com·5h
🎯Threat Hunting
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·1d·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
InfoSec News Nuggets 8/26/2025
aboutdfir.com·13h
🔓Hacking
Harness AI Tackles Software Development’s Real Bottleneck
thenewstack.io·14h
👁️Observatory Systems
AI Teams Contend With Synthetic Data’s Jekyll/Hyde Roles
cacm.acm.org·12h
🔍Vector Forensics
Research Worth Reading Week 32/2025
pentesterlab.com·2d
🔓Hacking
Go module for brute force attacks on SSH steals the accesses found
heise.de·1d
🛣️BGP Hijacking
Fuzz-testing Go HTTP services
packagemain.tech·4d·
Discuss: r/golang
🧪Binary Fuzzing
Using Real Survey Data to Create Authentic AI Personas for Extended Research
askrally.com·15h·
Discuss: Hacker News
🏛Digital humanities
Loading...Loading more...
AboutBlogChangelogRoadmap