🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.com·2d
🔄Archival Workflows
Label Maker | Better Default Code (Edit friendly)
hackster.io·1h
🔧KAITAI
IBM Storage Protect Server is vulnerable to authorization bypass attack
ibm.com·1d·
Discuss: Hacker News
💣ZIP Vulnerabilities
IP Sentry (Golang)
dev.to·1d·
Discuss: DEV
🛡️eBPF Security
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.com·10h
🔓Hacking
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.com·23h·
Discuss: Hacker News
📲Digitization
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.org·1d
🛡️eBPF Security
Show HN: Laburity – Dark and Deep Web Monitoring
laburity.com·1d·
Discuss: Hacker News
🔓Hacking
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
Understanding and Improving Web Security Performance
forbes.com·1d·
Discuss: Hacker News, r/devops
🌊Streaming Systems
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·18h
🦠Malware Analysis
Why Your Next LLM Might Not Have A Tokenizer
towardsdatascience.com·1d
🤖Grammar Induction
AES and Symmetric Key Encryption: The Key to Reliable Data Security
dev.to·2d·
Discuss: DEV
🔐Cryptographic Archaeology
Slashing CI Costs at Uber
uber.com·17h·
Discuss: Hacker News
🔄Reproducible Builds
Memory Safety in Web Rust System Zero Cost Secure(1750762127113200)
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Data Compression with Relative Entropy Coding
arxiv.org·2d
📐Compression Mathematics
Text Compressing Introduction - Huffman Coding in Swift
dev.to·2d·
Discuss: DEV
📦Deflate
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·2d
🔒Language-based security
The Cost of AI-Generated Code: Detection vs. Remediation
rsolv.dev·1h·
Discuss: Hacker News
📏Code Metrics
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.com·1d
🎯NTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap