🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Joint statement on protecting human rights online and preventing internet shutdowns in times of armed conflict
freedomonlinecoalition.com·1d
⚖️Legal Compliance
Brother printer owners should stop using the default password ASAP
techspot.com·15h
🔓Password Cracking
Joint Force - 2025 Ebitengine game jam entry
rocketnine.itch.io·8h·
Discuss: r/Android, r/golang, r/linux, r/opensource
🎯Proof Tactics
Conceptual synaesthesia as cognitive literacy
madinamerica.com·18h·
Discuss: Hacker News
📼Tape Linguistics
Device Tree Overlays on Jetson – Scary but Fun
jetsonhacks.com·15h·
Discuss: Hacker News
🖥️Modern Terminals
Show HN: Build Discord bots, earn prizes (18 and under)
converge.hackclub.com·10h·
Discuss: Hacker News
🚀Indie Hacking
OAuth consent phishing explained and prevented
techcommunity.microsoft.com·2d·
Discuss: Hacker News
🔓LDAP Injection
Reverse Engineering the Microchip CLB Part 1: Background and Reverse Engineering the BLEs
mcp-clb.markomo.me·3d·
Discuss: Lobsters, Hacker News, r/embedded
🔬Binary Analysis
Cisco fixes two critical make-me-root bugs on Identity Services Engine components
theregister.com·2d
🧪CBOR Fuzzing
Future Android phones could warn you about data-stealing fake cell towers
arstechnica.com·1d·
Discuss: Lobsters, Hacker News, r/Android, r/technews
🛡️ARM TrustZone
AppSec as Glue: Building Partnerships to Scale Security
tldrsec.com·2d·
Discuss: Hacker News
🔐Capability Systems
HarmonyOS Development: The first article on the application shelf, generating key and certificate request files
dev.to·1d·
Discuss: DEV
🔌Operating system internals
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.to·1d·
Discuss: DEV
🎫Kerberos Attacks
The Future of AI Is Physical: Simulation Is Key
inductiva.ai·1d·
Discuss: Hacker News
🔲Cellular Automata
Becoming a 10x Engineer in the Era of AI Agents
dev.to·22h·
Discuss: DEV
🏠Homelab Orchestration
AI Powered Honeypot
dev.to·3d·
Discuss: DEV
🦠Malware Analysis
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.org·5d
💻Local LLMs
This new malware has developed a spooky way to tell AI-based detection methods to ignore it
techradar.com·1d
🦠Malware Analysis
What exactly is a smart home? 3 things you need to know to get started
techradar.com·1d
🏠Home Automation
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.org·3d·
Discuss: Hacker News
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap