🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Introducing builtwithhare.org
harelang.org·1d
🏠Personal Archives
OTW - Bandit Level 3 to Level 4
tbhaxor.com·1d
🔓Reverse engineering
FTP Security Risks, Vulnerabilities & Best Practices Guide
securityscorecard.com·4d
📡Feed Security
US military wants to secure the internet by making it more quantum
newscientist.com·10h
⚛️Quantum Tape
Saleae Analyzer for the BDM protocol
zetier.com·2d
🔬Binary Analysis
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.com·1d
📟Terminal Forensics
Building a Distributed Filesystem for Scalable Research
hudsonrivertrading.com·2d·
Discuss: Hacker News
🗄️File Systems
Ergonomic errors in Rust: write fast, debug with ease, handle precisely
gmcgoldr.github.io·10h·
Discuss: Hacker News
⚡Dependent Rust
Stop Calling It OSINT
dutchosintguy.com·17h
🔎OSINT Techniques
Show HN: ZipZoomer – Online Zip Archive Explorer
zipzoomer.fly.dev·4d·
Discuss: Hacker News
🏺ZIP Archaeology
I'm too dumb for Zig's new IO interface
openmymind.net·1d·
Discuss: Lobsters, Hacker News
🌐NetworkProtocols
I am the CEO of an endpoint management firm, and it's baffling how often governments overlook unsecured devices
techradar.com·18h
💾Persistence Strategies
The ABCs of “‑ishing”: From Phishing to Quishing
bitsight.com·1d
🎯Threat Hunting
**Mastering HTTP/2 Server Performance Optimization in Go for High-Traffic Applications**
dev.to·9h·
Discuss: DEV
⚡gRPC
LUKS In-Place Conversion Tool
johannes-bauer.com·4d
🏺ZIP Archaeology
Can AI weaponize new CVEs in under 15 minutes?
valmarelox.substack.com·23h·
Discuss: Substack
🧪Protocol Fuzzing
Individual URL compression experiment initial thoughts
notes.volution.ro·3d·
Discuss: Hacker News
📝Text Compression
Netskope Has Filed for an IPO
sec.gov·9h·
Discuss: Hacker News
⚡HTMX
Memento: A Survival Guide for Building Real Software with a Forgetful Genius
dev.to·1d·
Discuss: DEV
🧠Memory Forensics
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
microsoft.com·4d
🌐DNS Security
Loading...Loading more...
AboutBlogChangelogRoadmap