🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

Mixed nuts #15
brycewray.com·2h
📰RSS Reading Practices
An OCC Idea
lambdacreate.com·1d
🗄️Database Internals
Openfire 5.0.0 Released – Open-Source – Java XMPP/Jabber Server
discourse.igniterealtime.org·1d·
Discuss: Hacker News
🔓Open Source Software
9 Nerdy Ways to SSH into a Server
adaptive.live·12h·
Discuss: Hacker News
🔌Operating system internals
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Treasure Case Sharing of HarmonyOS 5 Development — Practical Tips for Application Architecture
dev.to·22h·
Discuss: DEV
🔌Interface Evolution
Structured Logging in NextJS with OpenTelemetry
dev.to·12h·
Discuss: DEV
📝Log Parsing
The AWS Well-Architected Deep Dive (2/7): Is Your Cloud a Well-Oiled Machine or a Ticking Time Bomb?
dev.to·5h·
Discuss: DEV
💾Persistence Strategies
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·16h
🔍BitFunnel
What Is a Web Application Firewall and Do You Need One?
securityscorecard.com·2d
🌊Stream Processing
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·1d
🎫Kerberos Exploitation
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·1d·
Discuss: Hacker News
🧩WASM Modules
Challenging projects every programmer should try
austinhenley.com·6h·
Discuss: Hacker News
📝Compiler Design
BSD Now 616: Insights from FreeBSD Foundation Leaders
discoverbsd.com·3d
🔌Operating system internals
Libxml2's "no security embargoes" policy
lwn.net·1d·
Discuss: Hacker News
🔓Open Source Software
Part 5: How to Become a Pentester in 2025: Certifications, Career Roadmap & Growth
infosecwriteups.com·10h
🕵️Penetration Testing
CitrixBleed 2: The nightmare that echoes the ‘CitrixBleed’ flaw in Citrix NetScaler devices
securityaffairs.com·13h
🎫Kerberos Attacks
A New Era of Code Quality: Beyond bugs to supply chain security and dependency health
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Ubuntu Fundamentals: kernel
dev.to·5d·
Discuss: DEV
🔍eBPF
What if Microsoft just turned you off? Security pro counts the cost of dependency
theregister.com·2h
🏠Homelab Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap