๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฃ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Ripping CDs the old way
thefoggiest.devยท11h
๐Ÿ“ผCassette Archaeology
Label Maker | Better Default Code (Edit friendly)
hackster.ioยท9h
๐Ÿ”งKAITAI
Building Digital Preservation Skills Using the DPCโ€™s Novice to Know-How (N2KH) Courses
saaers.wordpress.comยท2d
๐Ÿ”„Archival Workflows
How to Migrate a Large Proxmox Virtual Machine to another Host
homeserverguides.comยท20hยท
Discuss: r/homelab
๐Ÿ’พProxmox Storage
Comparing the American and Chinese 0day Pipelines
news.risky.bizยท8h
๐Ÿ”“Hacking
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.comยท18h
๐Ÿ’ฟZFS Internals
Introducing Northguard and Xinfra: Scalable log storage at Lin...
linkedin.comยท1dยท
Discuss: Lobsters
๐ŸŒŠStreaming Systems
Security Advisory: Airoha-based Bluetooth Headphones and Earbuds
insinuator.netยท1h
๐Ÿ”HSM Integration
SSL and TLS Deployment Best Practices
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deยท1d
๐ŸŽซKerberos Exploitation
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comยท1d
๐Ÿ”„Burrows-Wheeler
All you wanted to know about sw vulnerabilitiesโ€ฆbut were too busy to look into - DevConf.CZ 2025
youtube.comยท2h
๐Ÿ”CBOR
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
darkreading.comยท19h
๐Ÿ”“Hacking
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท20hยท
Discuss: Substack
๐Ÿฆ€Rust Macros
Encrypt & Decrypt Text Securely in the Browser
dev.toยท6hยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.comยท20h
๐Ÿ”“Hacking
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toยท13hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Probing AI Safety with Source Code
arxiv.orgยท7h
โœจEffect Handlers
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท3h
๐Ÿ”“Hacking
How to Prevent AI Agents from Accessing Unauthorized Data - DevConf.CZ 2025
youtube.comยท2h
๐Ÿ”„Archival Workflows
Loading...Loading more...
AboutBlogChangelogRoadmap