๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

Emacs: Open URLs or search the web, plus browse-url-handlers
sachachua.comยท13h
๐ŸงFOSS
AI-Driven Password Recovery: Myth or Reality?
blog.elcomsoft.comยท4d
๐Ÿ”“Password Cracking
On Forcing AI Where It Does Not Belong
thenewleafjournal.comยท1d
๐ŸŽ›๏ธFeed Filtering
Java Criminally Underhyped? Not Back in 1997. (2021)
dylanbeattie.netยท2dยท
Discuss: Hacker News
๐ŸŽฎSwitch Archaeology
Writing an IR from Scratch and survive to write a post
farena.inยท1dยท
Discuss: Lobsters
๐Ÿ“Compiler Design
AMD Warns of New Meltdown, Spectre-like Bugs Affecting CPUs
it.slashdot.orgยท2d
๐ŸงชHardware Fuzzing
Claude Code/Cursor is using grep? Are we devolving
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Short story written by a friendly AI
news.ycombinator.comยท2dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
The inevitable trend toward low code makes programming tedious
thefoggiest.devยท2dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
The dual reality of AI-augmented development: innovation and risk
cyberscoop.comยท4d
๐ŸŽฏThreat Hunting
We asked 9 AI and agent builders about their top problems
unionailoop.substack.comยท2dยท
Discuss: Substack
๐Ÿ‘๏ธObservatory Systems
Know Your Enemy: Understanding Dark Market Dynamics
darkreading.comยท2d
๐ŸŒณArchive Merkle Trees
Python Memory Optimization: Essential Techniques for Data-Intensive Applications That Actually Work
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel
theregister.comยท3d
๐ŸŽซKerberos Attacks
Czechia warns that DeepSeek can share all user information with the Chinese government
tomshardware.comยท16h
๐Ÿ”คEBCDIC Privacy
Intel CEO reportedly admits 'it is too late for us' to catch AI leaders like Nvidia, but here's how it could still recover
techradar.comยท19h
๐ŸงฒRISC-V Archaeology
On Jailbreaking Quantized Language Models Through Fault Injection Attacks
arxiv.orgยท4d
๐Ÿ”งBinary Parsers
How to Approach Finding Bugs Easily: My Bug Hunting Methodology
infosecwriteups.comยท4d
๐Ÿฆ Malware Analysis
How We Got ChatGPT to Recommend Us (And How You Can Too)
hackernoon.comยท15h
๐Ÿ“ŠFeed Optimization
PIC Burnout: Dumping Protected OTP Memory in Microchip PIC MCUs
hackaday.comยท2d
๐Ÿ’พFloppy Imaging
Loading...Loading more...
AboutBlogChangelogRoadmap