🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Password Cracking

Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration

The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·1d
🔐Cryptographic Archaeology
How to automatically decrypt a LUKS LVM setup on boot with a USB
dev.to·4h·
Discuss: DEV
🔒Hardware Attestation
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·5h
🦠Malware Analysis
Password-Derived Signature Authentication
github.com·1d·
Discuss: Hacker News
🔒LDAP Security
Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)
isc.sans.edu·19h
🔓Hacking
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.uk·1d
🔍NTLM Forensics
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.com·1h
🎫Kerberos Attacks
XOR Marks the Flaw in SAP GUI
darkreading.com·1h
🔓Hacking
Building a One-time Password Token with the Pi Pico W
hackster.io·16h
🌊Stream Ciphers
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nl·9h
🌊Stream Ciphers
Meet Mojo: The Language That Could Replace Python, C++, and CUDA
hackernoon.com·6h
⬆️Lambda Lifting
PDFguard: AI Engine Against Growing Threats in PDFs
blog.checkpoint.com·1d
📄PDF Archaeology
How much slower is random access, really?
samestep.com·1d·
Discuss: Hacker News
📼Tape Encoding
Program Execution, follow-up
windowsir.blogspot.com·1h·
Discuss: www.blogger.com
⚡Performance Tools
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·5h
🎫Kerberos Attacks
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·12m
🕵️Penetration Testing
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.org·1d
🛡️eBPF Security
The one-more-re-nightmare compiler (2021)
applied-langua.ge·21h·
Discuss: Lobsters, r/programming
🔍RegEx Engines
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap