๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿงช Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

EPYTEST_PLUGINS and other goodies now in Gentoo
blogs.gentoo.orgยท3d
โšกProof Automation
Reflections on SoCraTes 2025
disintegrated.partsยท1dยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
ChatGPT can be a disaster for lawyers โ€” Robin AI says it can fix that
theverge.comยท1d
โšกProof Automation
Claude Code, but for SQL, Beekeeper Studio 5.3
beekeeperstudio.ioยท11hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Google Workspace is rolling out a security update to stop token stealing attacks
theverge.comยท11h
๐Ÿ”“Hacking
Got tired of Synology slow interface, so I built a CLI security auditing tool while learning Go
github.comยท2d
๐Ÿ”HSM Integration
Python source code analyzer based on distrust
github.comยท2dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
What if Left-Right and Seq-Lock had a baby?
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”’Type Safety
How misinformation spreaders reframe news from reputable sources to support false claims
phys.orgยท1d
๐Ÿ“ฐContent Curation
Developers remain willing but reluctant to use AI: The 2025 Developer Survey results are here
stackoverflow.blogยท8hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
๐Ÿ›ก๏ธ PayShield: The Voice-Powered Shield Against $2.4B Daily Invoice Fraud
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘‚Audio Evidence
AI Coding Assistants Are the New Compilers
marmelab.comยท10hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Latent Representations of Intracardiac Electrograms for Atrial Fibrillation Driver Detection
arxiv.orgยท21h
๐Ÿง Machine Learning
Why Not Matrix (2024)
benharri.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Machine Learning Fundamentals: hyperparameter tuning
dev.toยท3dยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
Would you use a system that turns your raw input into structured team training?
news.ycombinator.comยท18hยท
Discuss: Hacker News
โš”๏ธLean Tactics
CleANN: Efficient Full Dynamism in Graph-based Approximate Nearest Neighbor Search
arxiv.orgยท21h
๐Ÿ—‚๏ธVector Databases
The Tea App Hack: A Case Study in Online Dating, Privacy, and Digital Ethics
hackernoon.comยท13h
๐Ÿ”“Hacking
Why Flow Matching is Particle Swarm Optimization?
arxiv.orgยท21h
๐ŸŽฏPerformance Proofs
28th July โ€“ Threat Intelligence Report
research.checkpoint.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap