๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

Napster, Kazaa, and the Entrepreneurial Outlaws
brajeshwar.comยท15h
๐Ÿ“ผCassette Culture
Windows Defender
forums.anandtech.comยท1d
๐Ÿ›ก๏ธeBPF Security
โ€˜You want to talk about a world of lies?โ€™ Teaching philosophy in prison | Jay Miller
theguardian.comยท1d
๐Ÿ›๏ธPhilosophy
How to make Windows 11 into a quiet, fast, un-modern desktop
dedoimedo.comยท3h
๐Ÿ”ŒOperating system internals
At Least 15 Million YouTube Videos Have Been Snatched by AI Companies
theatlantic.comยท44m
๐Ÿง Learned Codecs
Walking around the app
veekaybee.github.ioยท1d
๐Ÿ”Concolic Testing
Suspected China-linked hackers tried to pose as republican lawmaker, panel says
japantimes.co.jpยท1d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
LisaGUI
lisagui.comยท13hยท
Discuss: Lobsters, Hacker News
๐Ÿ–ฅ๏ธVintage Macintosh
Show HN: My portfolio in the style of a campy early-internet Geocities site
jmkod.esยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Enabling Self-Correcting AI Agents Through Autonomous Integration Testing
metalbear.comยท1dยท
Discuss: r/devops
๐Ÿ Homelab Pentesting
Ask HN: How can AI be used in brain machine interfaces?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿค–Tape Automation
Billion-Line Days Demand Billion-Test Nights
momentic.aiยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
The exceptionalism of software is unwarranted
overbring.comยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
5 Benefits of Using Penetration-Tested Translation Software
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธPenetration Testing
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.orgยท1d
๐ŸŽซKerberos Attacks
ICYMI: Exposure Management Academy on Attack Surface Management, Proactive Security and More
tenable.comยท2d
๐ŸŽฏThreat Hunting
Promptware Attacks Against LLM-Powered Assistants in Production
sites.google.comยท3dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
ActiveState and RL: Unlocking Software Supply Chain Security
reversinglabs.comยท43m
๐Ÿ”—Supply Chain
How Hackers Use Google Dorks to Find Secrets
infosecwriteups.comยท4d
๐Ÿ”“Password Cracking
You are not going to turn into Google eventually
idiallo.comยท4hยท
Discuss: Hacker News
โ„๏ธNix Flakes
Loading...Loading more...
AboutBlogChangelogRoadmap