Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Password Cracking
Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
181808
posts in
20.1
ms
CPU Optimization of a
Monocular
3D
Biomechanics
Pipeline for Low-Resource Deployment
⚡
SIMD Vectorization
arxiv.org
·
5d
CppCon 2025 Can Standard C++ Replace CUDA for GPU Acceleration? --
Elmar
Westphal
🖥️
Terminal Renaissance
isocpp.org
·
1d
2FA: A dedicated two-factor
authenticato
to
securely
manage one-time passwords
🔐
PAKE Protocols
codeberg.org
·
22h
·
Hacker News
Regular
Password
Resets
Aren’t as Safe as You Think
🔓
Hacking
bleepingcomputer.com
·
2d
TRY
HACK
ME- ROOM
📼
Cassette Hacking
systemweakness.com
·
6d
Secure and
Updatable
Single
Password
Authentication
🔐
PAKE Protocols
eprint.iacr.org
·
4d
Verifpal
0.51.0: Sharper Semantics for Passwords, Assertions, and
AEAD
🧪
Binary Fuzzing
symbolic.software
·
5d
Hacking
🔓
Hacking
minitel.us
·
5d
Data Heist
Scenerio
:
HackViser
🔓
Hacking
medium.com
·
3d
The Cost of Understanding: LLM-Driven Reverse Engineering vs
Iterative
LLM
Obfuscation
🧮
Z3 Solver
elastic.co
·
4d
PASTA: A Patch-Agnostic
Twofold-Stealthy
Backdoor Attack on Vision Transformers
🕵️
Vector Smuggling
arxiv.org
·
2d
How to HACK Windows User Password Using
DPAPI
Master Key and
SID
🎯
NTLM Attacks
medium.com
·
5d
Are
passwords
putting
you at risk?
🔓
Hacking
malware.news
·
5d
TLSCheck
2.0: An Enhanced Memory Forensics Approach to Efficiently Detect TLS
Callbacks
🧠
Memory Forensics
arxiv.org
·
2d
Vector-Input
Hashing
Modes for Collision-Resistant
Pseudorandom
Function
🔐
Hash Functions
eprint.iacr.org
·
5d
MCP
Pitfall
Lab:
Exposing
Developer Pitfalls in MCP Tool Server Security under Multi-Vector Attacks
🌐
DNS Security
arxiv.org
·
1d
How Strong is the
FO-Calypse
, Really?
Instantiating
Plaintext-Checking Oracles against Masked Software Implementations of ML-KEM
🧪
Binary Fuzzing
eprint.iacr.org
·
5d
Depth Registers Unlock
W4A4
on
SwiGLU
: A Reader/Generator Decomposition
📼
Cassette Combinators
arxiv.org
·
4d
Terminal
Wrench
: A Dataset of 331
Reward-Hackable
Environments and 3,632 Exploit Trajectories
📼
Cassette Hacking
arxiv.org
·
4d
QUACK
! Making the (Rubber)
Ducky
Talk: A Systematic Study of Keystroke Dynamics for HID Injection Detection
🕹️
Retro Gaming
arxiv.org
·
5d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help