🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

The Case of Hidden Spam Pages
blog.sucuri.net·12h
🌐WARC Forensics
How do CAPTCHAs Work?
corero.com·19h
⚡Proof Automation
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·18h
🎯Threat Hunting
Is there a way to print a list of vulnerabilities?
reddit.com·1h·
Discuss: r/linux
📺VT100
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.com·15h
🎫Kerberos Exploitation
Networking for Systems Administrators
mwl.io·20h·
Discuss: Hacker News
🌐DNS over QUIC
Hello, Medium Family! Yamini Yadav Here, Sharing My OSCP Journey & Essential Port Insights!
infosecwriteups.com·1d
🌐Network Security
A CRDT-based Messenger in 12 Lines of Bash Using a Synced Folder
holdtherobot.com·1h·
Discuss: Lobsters, Hacker News
🔀CRDT
Voxkryptia: A Conceptual Framework for Advanced Database Security
dev.to·2h·
Discuss: DEV
🧬PostgreSQL Forensics
The Rise of Security Augmentation (2022)
strategyofsecurity.com·2d·
Discuss: Hacker News
🔐Capability Systems
Golang and Let's Encrypt: a free software story
dotat.at·7h·
Discuss: Hacker News
🌳Archive Merkle Trees
Inside the MSHTML Exploit: A SOC Analyst’s Walkthrough of CVE-2021–40444
infosecwriteups.com·2d
💣ZIP Vulnerabilities
AI is Hallucinating Package Names - And Hackers Are Ready
dev.to·8h·
Discuss: DEV
🚀Indie Hacking
How Secure Is a Generative AI Voice Bot for Your Operations?
dev.to·34m·
Discuss: DEV
👂Audio Evidence
Why ‘TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.com·1d
🌐Network Security
16 billion passwords from Apple, Facebook, Google and more leaked. Why has no one heard of it?
the-independent.com·22h
🔓Password Cracking
The collective waste caused by poor documentation
shanrauf.com·1d·
Discuss: Hacker News
📦Deflate
Program Execution, follow-up
windowsir.blogspot.com·21h·
Discuss: www.blogger.com
⚡Performance Tools
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·1d
🎫Kerberos Exploitation
Watch out AI fans - cybercriminals are using jailbroken Mistral and Grok tools to build powerful new malware
techradar.com·1d
🚀Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap