Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Password Cracking
Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24209
posts in
1.17
s
New Features of
Detox
Demo: Security
Scanning
+ Android Support + Cross-Platform Builds!
tjmaher.com
·
4d
·
Discuss:
Blogger
🎮
Game Decompilation
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
4d
🎯
Performance Forensics
Unlocking
a better future with old
computers
goodinternetmagazine.com
·
5d
💾
vintage computing
Podcast
Spotlight
: The Threat from Quantum
Computers
assured.se
·
5d
🔐
Quantum Security
From Automation to Infection (Part II): Reverse Shells, Semantic
Worms
, and Cognitive
Rootkits
in OpenClaw Skills
blog.virustotal.com
·
6d
·
Discuss:
blog.virustotal.com
🔓
Hacking
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
5d
🎫
Kerberos Exploitation
What Every
Programmer
Needs to Know about Quantum Safe
Cryptography
and Hidden Number Problems
leetarxiv.substack.com
·
6d
·
Discuss:
Substack
,
r/programming
🔐
Quantum Security
Hackers
(1995)
Animated
Experience
hackers-1995.vercel.app
·
4d
·
Discuss:
Lobsters
,
Hacker News
📼
Cassette Hacking
learning by
reverse
engineering
clymup.com
·
3d
🔓
Reverse engineering
Taming the Regex Monster: Optimizing Massive
Literal
Alternations
modern-c.blogspot.com
·
5d
·
Discuss:
r/golang
🔍
RegEx Engines
https://www.cl.cam.ac.uk/~
mgk25/ucs/examples/UTF-8-test.txt
cl.cam.ac.uk
·
3d
🔤
Character Encoding
The
OpenClaw
Supply Chain Attack Was
Inevitable
. Here is What We Built Before It Happened.
dev.to
·
3d
·
Discuss:
DEV
🎫
Kerberos Attacks
InfraBuilder
: The
Deterministic
Hardware Architect
dev.to
·
3d
·
Discuss:
DEV
🧱
Immutable Infrastructure
ACORN-IDS
: Adaptive Continual
Novelty
Detection for Intrusion Detection Systems
arxiv.org
·
1d
🎯
Threat Hunting
Momentum-Driven
Reversible
Logic Accelerates Efficient
Irreversible
Universal Computation
arxiv.org
·
1d
⚛️
Quantum Error Correction
Bytes
as
Braille
engrenage.ch
·
4d
·
Discuss:
Hacker News
📜
Binary Philology
Client-Side
Encrypted
Posts in
Jekyll
joshbeckman.org
·
6d
·
Discuss:
Hacker News
🔐
Archive Encryption
Show HN:I made
CyberChecker
after finding exposed
Stripe
keys in production
cyber-checker.com
·
5d
·
Discuss:
Hacker News
✅
Archive Fixity
Built with
Opus
4.6: a Claude Code
hackathon
cerebralvalley.ai
·
4d
·
Discuss:
Hacker News
🦀
Rust Macros
The
Null
Pointer
Crisis: Running God-Mode Software on Legacy Hardware
news.ycombinator.com
·
5d
·
Discuss:
Hacker News
🧪
Hardware Fuzzing
Loading...
Loading more...
« Page 20
•
Page 22 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help