🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Password Cracking

Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration

Stop Exposing Your Data: How to Pack IDs, UUIDs, and More with Obfusbit
dev.to·10h·
Discuss: DEV
💣Compression Security
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
embracethered.com·22h·
Discuss: Hacker News
🚀Indie Hacking
Launch: Free and Focused Password Generator at GeneratePassword12
generatepassword12.org·1d·
Discuss: Hacker News
🔐Hash Functions
Hack The Box Academy Writeup — PASSWORD ATTACKS — Writing Custom Wordlists and Rules
infosecwriteups.com·4d
⚡Proof Automation
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.org·1h
⚡Proof Automation
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.com·10h·
Discuss: Hacker News
🔓Hacking
Factoring RSA100
johndcook.com·3h
🔧Reed-Solomon
Let's hax0r a GC… (eventually)
h4x0r.org·14h·
Discuss: Lobsters, Hacker News
🧠Memory Allocators
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·18h
⚗️Algebraic Coding
This App Instantly Blocks Out Sensitive Info From Your Mac Screenshots
lifehacker.com·10h
🧪Archive Fuzzing
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.io·10h
🔍eBPF
Introducing luzer, a coverage-guided Lua fuzzing engine
bronevichok.ru·13h·
Discuss: Lobsters, Hacker News
🧪Binary Fuzzing
Hashcat v7.0.0 Released
github.com·3d·
Discuss: Hacker News
🖥️Terminal Renaissance
Red-teaming a RAG app: What happens?
blog.pamelafox.org·12h·
Discuss: www.blogger.com, Hacker News
⚡Proof Automation
Plague: A Newly Discovered Pam-Based Backdoor for Linux
nextron-systems.com·2d·
Discuss: Hacker News
🧪Binary Fuzzing
Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer
securityaffairs.com·12h
🎫Kerberos Exploitation
Wow. Bitcoin is almost $1,500
forums.anandtech.com·5h
🔗Hash Chains
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.com·19h
🦠Malware Analysis
Josh Lockhart & Phil Sturgeon
deprogrammaticaipsum.com·1d
🦀Rusty Databases
Turning Human Vulnerability Into Organizational Strength
darkreading.com·15h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap