🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Participate in the Digital Preservation Bake Off (Tools Demonstration) at iPRES 2025
dpconline.org·15h
📄Document Digitization
How to Migrate a Large Proxmox Virtual Machine to another Host
homeserverguides.com·1d·
Discuss: r/homelab
💾Proxmox Storage
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.com·1d
💿ZFS Internals
IBM Storage Protect Server is vulnerable to authorization bypass attack
ibm.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
HariSekhon/DevOps-Bash-tools
github.com·1d
🐚Shell Automation
Defining Zero Trust for Bring Your Own Cloud (BYOC)
signoz.io·6h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Slashing CI Costs at Uber
uber.com·1d·
Discuss: Hacker News
🔄Reproducible Builds
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·15h
🔐CBOR
Deep Dive into Databend UDF, implementing your data solutions with python, WASM and beyond
dev.to·1d·
Discuss: DEV
📋DFDL
Probing AI Safety with Source Code
arxiv.org·19h
✨Effect Handlers
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.com·2d
🎯NTLM Attacks
Password-Derived Signature Authentication
github.com·2d·
Discuss: Hacker News
🔒LDAP Security
Hong Mong 5 Development Treasure Case Sharing Cross-Thread Performance Optimization Guide
dev.to·1d·
Discuss: DEV
👁️System Observability
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
darkreading.com·1d
🔓Hacking
Encrypt & Decrypt Text Securely in the Browser
dev.to·19h·
Discuss: DEV
🛡️WASM Security
How to Prevent AI Agents from Accessing Unauthorized Data - DevConf.CZ 2025
youtube.com·15h
🔄Archival Workflows
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.com·1d
🔓Hacking
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·19h
📄Document Digitization
MMSearch-R1: Incentivizing LMMs to Search
arxiv.org·19h
🔍BitFunnel
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·7h·
Discuss: DEV
🌐Network Protocols
Loading...Loading more...
AboutBlogChangelogRoadmap