🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

AI Teams Contend With Synthetic Data’s Jekyll/Hyde Roles
cacm.acm.org·16h
🔍Vector Forensics
Reproducible LLM Benchmarking: GPT-5 vs Grok-4 with Promptfoo
dev.to·10h·
Discuss: DEV
⚡gRPC
Claude Code's 19 cent Parser
blogger.com·1d
🔧Binary Parsers
How Deep Research Agents Can Leak Your Data
embracethered.com·2d
🏠Homelab Pentesting
Log Detective: GSoC 2025 (part 2)
danigm.net·3h
🔓Open Source Software
How AWS averted an AI coding supply chain disaster
reversinglabs.com·17h
⚙️Proof Engineering
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.org·7h
🦀Embedded Rust
I open-sourced a protocol to create auditable logs for AI agents
medium.com·18h·
Discuss: Hacker News
🚀Indie Hacking
Show HN: Enterprise MCP Bridge – Solving the MCP Chaos for IT
blog.inxm.ai·14h·
Discuss: Hacker News
🔌Interface Evolution
Securing and governing the rise of autonomous agents​​
microsoft.com·16h
🔐Capability Systems
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.com·1h
🎫Kerberos History
Researchers warn of security flaws in AI-powered browsers
techspot.com·13h
🔓Hacking
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.org·4h
🔒Language-based security
Claude Code Gets a Second Opinion from GPT-5
proxymock.io·1d·
Discuss: Hacker News
⚡Proof Automation
Certificates and Witnesses for Multi-objective {\omega}-regular Queries in Markov Decision Processes
arxiv.org·1d
🎯Performance Proofs
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·1d·
Discuss: Hacker News
🔱Galois Cryptography
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.com·19h
💣ZIP Vulnerabilities
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Reloading classes in python and shared borders
andrewpwheeler.com·21h·
Discuss: Hacker News
🦀Rust Macros
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.ai·13h·
Discuss: Hacker News
🔗Constraint Handling
Loading...Loading more...
AboutBlogChangelogRoadmap