🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

Six Secret Service agents suspended in fallout from Pennsylvania assassination attempt on Trump
theguardian.com·1h
🛡Cybersecurity
Superimposed codes, take two
blog.sesse.net·1d
🔢Bitwise Algorithms
The AWS Survival Guide for 2025: A Field Manual for the Brave and the Bankrupt
lastweekinaws.com·1d
🖥️Self-hosted Infrastructure
Regular Expression Matching Can Be Simple and Fast (2007)
swtch.com·20h·
Discuss: Hacker News
🔍RegEx Engines
An Ode to Pocket: Analysis of Exported Logs
blog.kelvin.ma·2d·
Discuss: Hacker News
📰RSS Reading Practices
Critical Analysis of the Meshtastic Protocol
disk91.com·26m·
Discuss: Hacker News
🕸️Mesh Networking
Free hands-on cyber security certification (CAPT)
hackviser.com·2d·
Discuss: Hacker News
🕵️Penetration Testing
Two Sudo Vulnerabilities Discovered and Patched
linux.slashdot.org·5d
💣ZIP Vulnerabilities
Remotely Wipe a Server (2011)
linuxjournal.com·2d·
Discuss: Hacker News
💾Persistence Strategies
Show HN: OpenAudit – Add auditing to your Node.js app with pluggable adapters
github.com·5h·
Discuss: Hacker News
🧩SQLite Extensions
Layers of Lawyers and Liars
matthewbutterick.com·3h·
Discuss: Hacker News
✓Automated Theorem Proving
What a Hacker Stole from Me
mynoise.net·5d·
Discuss: Hacker News, Hacker News
🚀Indie Hacking
KL-001-2025-009: Schneider Electric EcoStruxure IT Data Center Expert Remote Command Execution
seclists.org·19h
🛡️eBPF Security
Jack Dorsey says his ‘secure’ new Bitchat app has not been tested for security
techcrunch.com·23h·
Discuss: Hacker News
🚀Indie Hacking
AI Agent Smart Contract Exploit Generation
arxiv.org·1d
🧪Protocol Fuzzing
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
dev.to·1d·
Discuss: DEV
⚡gRPC
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks
arxiv.org·1d
🧪Hardware Fuzzing
Hacker 'turf war' unfolding as Russian DragonForce ransomware gang drama could lead to 'double extortions,' making life even worse for potential victims
tomshardware.com·2d
🏴‍☠️Piracy
Disappearing Ink: Obfuscation Breaks N-gram Code Watermarks in Theory and Practice
arxiv.org·1d
💧Digital Watermarking
CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands
theregister.com·2d
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap