🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
ajte0gK4IqIGMcYo8eqW's Likes
Subscribe
CVE 2025-31200 CoreAudio bug exploited in the wild
blog.noahhw.dev
·
8w
·
Discuss:
Lobsters
,
Hacker News
💻
Hacking
Quantum Punks Manifesto (2024)
quantumpunks.org
·
8w
·
Discuss:
Hacker News
🌌
Post-Quantum Crypto
VectorSmuggle: Covertly Exfiltrate Data in Embeddings
github.com
·
8w
·
Discuss:
Hacker News
🐧
eBPF Kernels
Self-Coordinated Deception in Current AI Models
lesswrong.com
·
8w
🎯
Red Team
Understanding Linux: The Kernel Perspective
leanpub.com
·
8w
·
Discuss:
Hacker News
🏗️
OS Internals
Proofs on a Leash: Post-Quantum Lattice Snark with Greyhound
blog.zksecurity.xyz
·
8w
·
Discuss:
Hacker News
🌌
Post-Quantum Crypto
Ischhfd83: When cybercriminals eat their own
news.sophos.com
·
8w
·
Discuss:
Lobsters
,
Hacker News
💥
Binary Exploitation
Research Update: Isolated Execution Environment for eBPF (Part 2)
ebpf.foundation
·
8w
🐧
eBPF Kernels
Linux Emulation in FreeBSD
docs.freebsd.org
·
8w
·
Discuss:
Hacker News
🔱
FreeBSD Security
The Art of Network Monitoring
hackster.io
·
8w
🌐
Network Security
Hypervisors for Memory Introspection and Reverse Engineering
memn0ps.github.io
·
8w
·
Discuss:
Hacker News
,
r/programming
🏃
Hypervisor Escapes
Docker under Siege: Securing Containers in the Modern Era
arxiv.org
·
8w
📦
Container Security
Reverse Engineering Snapchat (Part I): Obfuscation Techniques (2020)
hot3eed.github.io
·
8w
·
Discuss:
Hacker News
💥
Binary Exploitation
CVE-2025-4143
nvd.nist.gov
·
8w
·
Discuss:
Hacker News
🔒
Security
« Page 1