Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Password Cracking
Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24309
posts in
528.3
ms
New Features of
Detox
Demo: Security
Scanning
+ Android Support + Cross-Platform Builds!
tjmaher.com
·
4d
·
Discuss:
Blogger
🎮
Game Decompilation
Unlocking
a better future with old
computers
goodinternetmagazine.com
·
4d
💾
vintage computing
From Automation to Infection (Part II): Reverse Shells, Semantic
Worms
, and Cognitive
Rootkits
in OpenClaw Skills
blog.virustotal.com
·
6d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Claude Opus 4.6 found 500+ severe
flaws
in open source
repos
without much prompting
metacurity.com
·
4d
🔓
Hacking
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
5d
🎫
Kerberos Exploitation
What Every
Programmer
Needs to Know about Quantum Safe
Cryptography
and Hidden Number Problems
leetarxiv.substack.com
·
6d
·
Discuss:
Substack
,
r/programming
🔐
Quantum Security
Hackers
(1995)
Animated
Experience
hackers-1995.vercel.app
·
4d
·
Discuss:
Lobsters
,
Hacker News
📼
Cassette Hacking
Enhancing the
Vicinae
Launcher: My new extensions for
ProtonVPN
and ultra-fast fd file searching.
reddit.com
·
3d
·
Discuss:
r/linux
🖥️
Terminal Emulators
learning by
reverse
engineering
clymup.com
·
3d
🔓
Reverse engineering
Taming the Regex Monster: Optimizing Massive
Literal
Alternations
modern-c.blogspot.com
·
5d
·
Discuss:
r/golang
🔍
RegEx Engines
https://www.cl.cam.ac.uk/~
mgk25/ucs/examples/UTF-8-test.txt
cl.cam.ac.uk
·
3d
🔤
Character Encoding
The
OpenClaw
Supply Chain Attack Was
Inevitable
. Here is What We Built Before It Happened.
dev.to
·
3d
·
Discuss:
DEV
🎫
Kerberos Attacks
OpenClaw
for Beginners: Install,
Configure
, and Secure Your Bot
hackernoon.com
·
6d
⚡
Proof Automation
But .me can reveal actual values
pulled
from secret context without
revealing
the secret context.
dev.to
·
3d
·
Discuss:
DEV
🦠
Parasitic Archives
ACORN-IDS
: Adaptive Continual
Novelty
Detection for Intrusion Detection Systems
arxiv.org
·
1d
🎯
Threat Hunting
Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating
Amplified
Leakage
from Vector Seeds to Graph Expansion
arxiv.org
·
1d
🌸
Bloom Filters
Built with
Opus
4.6: a Claude Code
hackathon
cerebralvalley.ai
·
4d
·
Discuss:
Hacker News
🦀
Rust Macros
How to Program
Computers
(
KOS
)
fall.tr
·
5d
·
Discuss:
Lobsters
,
Hacker News
🔩
Systems Programming
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
·
6d
·
Discuss:
Lobsters
,
Hacker News
🌳
Archive Merkle Trees
How Meta turned the Linux Kernel into a planet-scale
Load
Balancer
. Part I
softwarefrontier.substack.com
·
3d
·
Discuss:
Substack
🤖
Network Automation
Loading...
Loading more...
« Page 19
•
Page 21 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help