🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

Golang and Let's Encrypt: a free software story
dotat.at·4h
🌳Archive Merkle Trees
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.com·13h
💿ZFS Internals
Show HN: I built a cloud on my own ASN w real 1:1 compute to fight the cartels
infuze.cloud·11h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·2d·
Discuss: Hacker News
🎯NTLM Attacks
Building a Language Server
bullno1.com·2d·
Discuss: Hacker News, r/programming
🗣️Domain-Specific Languages
Containers Sitting Around Doing (Mostly) Nothing
ezebunandu.substack.com·2d·
Discuss: Substack
📦Container Security
Web Numbers
ar.al·15h·
Discuss: Hacker News
📡DNS Archaeology
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·2h
📄Document Digitization
Memory Safety in Web Rust System Zero Cost Secure(1750885516953300)
dev.to·9h·
Discuss: DEV
🦀Rust Borrowing
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.com·1d
🎯NTLM Attacks
Sonicwall warns of fake NetExtender app infected with malicious code
heise.de·21h
🎫Kerberos Exploitation
Treasure Case Sharing of HarmonyOS 5 Development — Practical Tips for Application Architecture
dev.to·7h·
Discuss: DEV
🔌Interface Evolution
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
What Is a Web Application Firewall and Do You Need One?
securityscorecard.com·1d
🌊Stream Processing
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·2h
🔍BitFunnel
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·1d
🎫Kerberos Exploitation
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·21h·
Discuss: Hacker News
🧩WASM Modules
A New Era of Code Quality: Beyond bugs to supply chain security and dependency health
dev.to·12h·
Discuss: DEV
🔒WASM Capabilities
Libxml2's "no security embargoes" policy
lwn.net·10h·
Discuss: Hacker News
🔓Open Source Software
Stealthy backdoor found hiding in SOHO devices running Linux
helpnetsecurity.com·2d·
Discuss: Hacker News
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap