🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

Browser Errors vs. Link Lights: Demystifying Network Connectivity with the OSI Model
wp.c9h.org·7m
🌐Network Security
PDFguard: AI Engine Against Growing Threats in PDFs
blog.checkpoint.com·1d
📄PDF Archaeology
Gabrl: Securing Commmuniction
gabrl.com·1d·
Discuss: Hacker News
🔐Quantum Security
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes
dev.to·7h·
Discuss: DEV
🔌Interface Evolution
The Cost of AI-Generated Code: Detection vs. Remediation
rsolv.dev·24m·
Discuss: Hacker News
📏Code Metrics
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.to·12h·
Discuss: DEV
🔐Homomorphic Encryption
Show HN: Enigma Machine and Bombe Implemented in eBPF – Turing's 113th Birthday
github.com·2d·
Discuss: Hacker News
🔑Cryptographic Protocols
Openfire 5.0.0 Released – Open-Source – Java XMPP/Jabber Server
discourse.igniterealtime.org·11h·
Discuss: Hacker News
🔓Open Source Software
Why Linux Isn't Immune: The Rising Tide of Malware and How to Respond
journal.hexmos.com·3d·
Discuss: Hacker News
🔍eBPF
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·11h
🤖Network Automation
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.com·18h
🎯Threat Hunting
15 Critical Steps to Secure Your Linux Server: Complete Security Guide
dev.to·1d·
Discuss: DEV
🏠Homelab Security
Building a Scalable WAF Log Pipeline: From AWS WAF to Cortex XDR with CDK
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
LSFMM+BPF 2025 reporting complete
lwn.net·11h
📦METS Standards
Networking for Systems Administrators
mwl.io·12h·
Discuss: Hacker News
🌐DNS over QUIC
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.to·2d·
Discuss: DEV
🔓Password Cracking
Building a Language Server
bullno1.com·2d·
Discuss: Hacker News, r/programming
🗣️Domain-Specific Languages
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·17h
🔍NTLM Forensics
Containers Sitting Around Doing (Mostly) Nothing
ezebunandu.substack.com·2d·
Discuss: Substack
📦Container Security
Memory Safety in Web Rust System Zero Cost Secure(1750885516953300)
dev.to·4h·
Discuss: DEV
🦀Rust Borrowing
Loading...Loading more...
AboutBlogChangelogRoadmap