🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.org·11h
🔍Vector Forensics
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systems·1d·
Discuss: Lobsters, Hacker News, r/programming
📞Session Types
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.com·10h
🎫Kerberos Exploitation
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.com·23h
👁️System Observability
It’s a Cold Day in Developer Hell, So I Must Roll My Own Crypto
soatok.blog·3h
🌳Archive Merkle Trees
Why Relying on LLMs for Code Can Be a Security Nightmare
blog.himanshuanand.com·44m·
Discuss: Hacker News
🛡️WASM Security
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·2d
🔓Password Cracking
Guessing Game: Haskell Style
entropicthoughts.com·1d
👑Dependent Haskell
InfoSec News Nuggets 8/27/2025
aboutdfir.com·2h
🎫Kerberos Attacks
Binary Exploitation 101 - Introduction
r1ru.github.io·1d
📼Cassette Hacking
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.com·1d
🕵️Domain Enumeration
What is SAST and DAST? Key Differences Explained
boostsecurity.io·2d
🕵️Penetration Testing
Aembit Extends Secretless CI/CD With Credential Lifecycle Management For GitLab
hackernoon.com·6h
🔐PKI Archaeology
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·1d
✅Format Verification
Exploits and vulnerabilities in Q2 2025
securelist.com·5h
🔓Hacking
BGP’s security problems are notorious. Attempts to fix that are a work in progress
theregister.com·8h·
Discuss: Hacker News
🛣️BGP Hijacking
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.net·1d
🦀Rust Macros
Grammatical errors make prompt injections more likely
heise.de·1h
⚡Proof Automation
FortMajeure: Authentication Bypass in FortiWeb
pwner.gg·1h·
Discuss: Hacker News
🛡️WASM Security
Show HN: Enterprise MCP Bridge – Solving the MCP Chaos for IT
blog.inxm.ai·21h·
Discuss: Hacker News
🔌Interface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap