🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 RISC-V Cryptography

Hardware Security Extensions, Vector Cryptography, Open Security Architecture

Wyse 5060 reboots instead of entering BIOS
reddit.com·18h·
Discuss: r/homelab
🔒Secure Boot
My A-Z toolbox: dcfldd
rubenerd.com·13h
📋DFDL
Knuth’s Twindragon
johndcook.com·1h
📐Mathematical Art
12 Best DevSecOps Tools for Your CI/CD Pipeline
boostsecurity.io·22h
🛡️CLI Security
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.to·1d·
Discuss: DEV
✅Checksum Validation
Risky Bulletin: A decade later, Russian hackers are still using SYNful Knock, and it's still working
news.risky.biz·1d
🔓Hacking
Optimizing multiprecision LLL in FLINT
fredrikj.net·2d
🧮Algebraic Datatypes
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.com·2d
🌐DNS Security
My year-long quest to debug a single TCP connection
fdi.sk·7h·
Discuss: Hacker News
📡Network Archaeology
Icepath: a 2D Programming Language
healeycodes.com·1d·
Discuss: Hacker News
🔗Concatenative Programming
ImageIO, the Infamous iOS Zero Click Attack Vector (2024)
r00tkitsmm.github.io·12h·
Discuss: Hacker News
🧪Binary Fuzzing
Codanna now supports Go! Instant call graphs, code-aware lookup, zero servers
reddit.com·12h·
Discuss: r/golang
🦀Rust Macros
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.com·23h
🔓Hacking
Herb Sutter "Three Cool Things in C++26"
herbsutter.com·3d·
Discuss: Hacker News
🔩Systems Programming
The Supply Chain Paradox: When “Hardened” Images Become a Vendor Lock-in Trap
docker.com·3d
🔒Secure Boot
TrueNAS on Arm is finally a thing
jeffgeerling.com·17h·
Discuss: Hacker News
🏠HomeLab
Do I need a Lisp Machine comeback?
far.chickenkiller.com·1d·
Discuss: Hacker News
🦀Rust Macros
July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.
vmray.com·5d
🦠Malware Analysis
Semcheck: Spec-Driven Development Using LLMs
labs.rejot.dev·22h·
Discuss: Hacker News
⚡Proof Automation
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.to·20h·
Discuss: DEV
🔐Cryptographic Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap