🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“Ό Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

FreeBSD Errata Notice: TKIP Crypto Issue in wlan_tkip
discoverbsd.comΒ·1d
πŸ”ŒOperating system internals
Financially motivated cluster a key player in ToolShell exploitation
cybersecuritydive.comΒ·1d
🎫Kerberos Exploitation
Attack Surface Management Software: Top 10 Vendors
heimdalsecurity.comΒ·3d
πŸ”’WASM Capabilities
Opportunity to work with the kernel filesystem, as the maintainer calls for assistance. EXT4 BUG converted to feature
lore.kernel.orgΒ·2dΒ·
Discuss: r/linux
πŸ”ŒOperating system internals
Crypto Recovery Specialist – Blockchain Investigator – Helping Victims Reclaim
news.ycombinator.comΒ·2dΒ·
Discuss: Hacker News
⛏️File Carving
An easy-to-implement, arena-friendly hash map
nullprogram.comΒ·2dΒ·
Discuss: Lobsters
πŸ”Hash Functions
A Likely Zero-Day Vulnerability in SonicWall SSL-VPN Exploited by Akira Ransomware Group
research.kudelskisecurity.comΒ·3d
🎫Kerberos Exploitation
Replacing Agent Prompt Templates with Trainable Control Modules in DSPy
viksit.substack.comΒ·2dΒ·
Discuss: Substack
⚑Incremental Computation
Microsoft enabled Israeli spy agency's mass surveillance of Palestinians' mobile calls
metacurity.comΒ·3d
πŸ”“Hacking
Understanding and Mitigating Errors of LLM-Generated RTL Code
arxiv.orgΒ·1d
βœ…Format Verification
VulnOS β€œLegacy” Lab Walkthrough
infosecwriteups.comΒ·2d
🏠Homelab Pentesting
Data Dump From APT Actor Yields Clues to Attacker Capabilities
darkreading.comΒ·1d
πŸ”“Hacking
Burp Suite Cheatsheet
blackhillsinfosec.comΒ·3d
πŸ›£οΈBGP Hijacking
What It’s Like to Brainstorm with a Bot
newyorker.comΒ·6h
πŸ”²Cellular Automata
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.comΒ·4dΒ·
Discuss: Hacker News
πŸ”“Hacking
Mastering Go File Wizardry πŸ§™β€β™‚οΈπŸ“
dev.toΒ·22hΒ·
Discuss: DEV
πŸ’£ZIP Vulnerabilities
Python Fundamentals: copy
dev.toΒ·1dΒ·
Discuss: DEV
🌳Persistent Data Structures
Automated Consent Workflow Optimization via Dynamic Causal Inference & Reinforcement Learning
dev.toΒ·13hΒ·
Discuss: DEV
πŸ€–Archive Automation
Getting Good Results from Claude Code
dzombak.comΒ·1dΒ·
Discuss: Hacker News
βš”οΈLean Tactics
Exploring the TRS-80’s Color BASIC’s Random Number Function
hackaday.comΒ·1d
πŸ–₯Retro Computing
Loading...Loading more...
AboutBlogChangelogRoadmap