🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Protocol Fuzzing

Security Testing, Input Generation, Vulnerability Discovery, Automated Testing

FSM Library for Embedded C Projects
hackster.io·4d
🦀Embedded Rust
BSD Now 620: Postmortem for jemalloc
discoverbsd.com·1h
🔌Operating system internals
How to catch GitHub Actions workflow injections before attackers do
github.blog·1d
🛡️WebAssembly Security
Tao: The Power of the Graph (2013)
engineering.fb.com·53m·
Discuss: Hacker News
🌳B-tree Optimization
Intermediate Zig Build
rdunnington.github.io·7h·
Discuss: Hacker News
⚙️Build Archaeology
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.space·2d
🔢Bitwise Algorithms
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.org·20h·
Discuss: Hacker News
🔒WASM Capabilities
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Meta patches worrying security bug which could have exposed user AI prompts and responses - and pays the bug hunter $10,000
techradar.com·2d
🔓Hacking
Grep a million GitHub repositories via MCP
vercel.com·23h·
Discuss: Hacker News
⚡Proof Automation
Vibe Coding with AI: Ensuring User Needs Are Met
kamil.chm.ski·23h·
Discuss: Hacker News
🚀Indie Hacking
What's happening to Matlab? Or, "The slow demise of the engineering toolbox"
blog.pictor.us·4h·
Discuss: Hacker News
🔩Systems Programming
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
darkreading.com·1d
🔓Hacking
Kiro and the future of AI spec-driven software development
kiro.dev·1d·
Discuss: Lobsters, Hacker News
🔌Interface Evolution
TryHackMe Room Walkthrough: Billing
infosecwriteups.com·1d
🎫Kerberos Exploitation
MCP: A Practical Security Blueprint for Developers
thenewstack.io·2d
🔓Hacking
Knowledge Without Power: AI, Infrastructure, and the Ethics of Design
medium.com·22h·
Discuss: Hacker News
⚖️Emulation Ethics
Agents are advancing, fast. Security Needs to Keep Pace
techradar.com·3h
🔐Capability Systems
The Imitation Game: Turing Machine Imitator is Length Generalizable Reasoner
arxiv.org·8h
🧮Kolmogorov Complexity
Regex Is a 70-Year-Old Dinosaur—Here’s the Modern Alternative
hackernoon.com·1d
🔍RegEx Engines
Loading...Loading more...
AboutBlogChangelogRoadmap