๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท2d
๐ŸŒŠStream Ciphers
Checking data integrity
eclecticlight.coยท7h
โœ…Checksum Validation
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.orgยท9h
๐ŸงฎZ3 Solver
It is 1939 and you want to use public-key cryptography
shkspr.mobiยท3dยท
Discuss: Hacker News, shkspr.mobi
๐Ÿ—๏ธPaleocryptography
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.comยท1d
๐ŸงฌBitstream Evolution
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท16h
๐Ÿ”ขBitwise Algorithms
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.beยท3m
๐Ÿ“กBluetooth Archaeology
Towards a secret history of Voynichese gallowsโ€ฆ
ciphermysteries.comยท3d
๐Ÿ—๏ธPaleocryptography
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.orgยท1h
๐ŸŽฏNTLM Attacks
Understanding Registers and Data Movement in x86-64 Assembly
blog.codingconfessions.comยท1h
๐Ÿ”งRISC-V Assembler
A distributed systems reliability glossary
antithesis.comยท22hยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.comยท1d
๐ŸคDistributed Consensus
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท20h
๐ŸบZIP Archaeology
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท2d
๐Ÿ”NTLM Archaeology
Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
hackernoon.comยท21h
๐Ÿ”—Hash Chains
New research connects quantum computing power to the security of cryptographic systems
phys.orgยท1d
๐Ÿ”Quantum Security
Commodore, Apple, and the early computer days โ†ฆ
sixcolors.comยท13h
๐Ÿ’พvintage computing
Why burnout is one of the biggest threats to your security
techradar.comยท6h
๐ŸŽฏThreat Hunting
How to test LUKS passphrase on specific key slot
sleeplessbeastie.euยท1d
๐Ÿ”’Hardware Attestation
To be a better programmer, write little proofs in your head
the-nerve-blog.ghost.ioยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ›ก๏ธPreservation Proofs
Loading...Loading more...
AboutBlogChangelogRoadmap