🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

Log Detective: GSoC 2025 (part 2)
danigm.net·10h
🔓Open Source Software
Claude Code's 19 cent Parser
blogger.com·2d
🔧Binary Parsers
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.org·11h
🔒Language-based security
Certificates and Witnesses for Multi-objective {\omega}-regular Queries in Markov Decision Processes
arxiv.org·1d
🎯Performance Proofs
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·2d·
Discuss: Hacker News
🌳Archive Merkle Trees
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
isc.sans.edu·9h
🛡️CLI Security
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.ai·20h·
Discuss: Hacker News
🔗Constraint Handling
Using Real Survey Data to Create Authentic AI Personas for Extended Research
askrally.com·1d·
Discuss: Hacker News
🏛Digital humanities
Reloading classes in python and shared borders
andrewpwheeler.com·1d·
Discuss: Hacker News
🦀Rust Macros
Found to fixed: Beehiiv paywall bypass and leaked JWT token
bencohen.substack.com·2h·
Discuss: Substack
🚀Indie Hacking
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.com·8h·
Discuss: DEV, Hacker News
🔐Capability Systems
I open-sourced a protocol to create auditable logs for AI agents
medium.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Implementing Forth in Go and C
eli.thegreenplace.net·11h·
Discuss: Lobsters, Hacker News, Hacker News
🔗Concatenative Programming
Detecting and countering misuse of AI: August 2025
anthropic.com·15h·
Discuss: Hacker News
🕵️Vector Smuggling
ESET warns of PromptLock, the first AI-driven ransomware
securityaffairs.com·6h
🛡Cybersecurity
Vibe Coding Doesn't Replace Tech Skills; It Requires More of Them
pawelbrodzinski.substack.com·2h·
Discuss: Substack
📏Code Metrics
How to Run Multiple LLMs Locally Using Llama-Swap on a Single Server
kdnuggets.com·3h
⚙️WASM Runtime
How to Slow Down a Program? And Why it Can Be Useful.
stefan-marr.de·4h·
Discuss: Lobsters, Hacker News
🚀Compiler Optimizations
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·2d·
Discuss: Hacker News
🎫Kerberos Attacks
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
arxiv.org·11h
🤐Secure Multiparty
Loading...Loading more...
AboutBlogChangelogRoadmap