Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Password Cracking
Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23434
posts in
882.9
ms
New Features of
Detox
Demo: Security
Scanning
+ Android Support + Cross-Platform Builds!
tjmaher.com
·
4d
·
Discuss:
Blogger
🎮
Game Decompilation
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
5d
🎯
Performance Forensics
Unlocking
a better future with old
computers
goodinternetmagazine.com
·
5d
💾
vintage computing
Podcast
Spotlight
: The Threat from Quantum
Computers
assured.se
·
5d
🔐
Quantum Security
From Automation to Infection (Part II): Reverse Shells, Semantic
Worms
, and Cognitive
Rootkits
in OpenClaw Skills
blog.virustotal.com
·
6d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Claude Opus 4.6 found 500+ severe
flaws
in open source
repos
without much prompting
metacurity.com
·
4d
🔓
Hacking
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
6d
🎫
Kerberos Exploitation
Hackers
(1995)
Animated
Experience
hackers-1995.vercel.app
·
4d
·
Discuss:
Lobsters
,
Hacker News
📼
Cassette Hacking
learning by
reverse
engineering
clymup.com
·
3d
🔓
Reverse engineering
Taming the Regex Monster: Optimizing Massive
Literal
Alternations
modern-c.blogspot.com
·
5d
·
Discuss:
r/golang
🔍
RegEx Engines
https://www.cl.cam.ac.uk/~
mgk25/ucs/examples/UTF-8-test.txt
cl.cam.ac.uk
·
3d
🔤
Character Encoding
I Built a
RAG
Application from
Scratch
- Here's the Real Cost and Performance Data
dev.to
·
3d
·
Discuss:
DEV
🌀
Brotli Internals
The
OpenClaw
Supply Chain Attack Was
Inevitable
. Here is What We Built Before It Happened.
dev.to
·
3d
·
Discuss:
DEV
🎫
Kerberos Attacks
ACORN-IDS
: Adaptive Continual
Novelty
Detection for Intrusion Detection Systems
arxiv.org
·
1d
🎯
Threat Hunting
Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating
Amplified
Leakage
from Vector Seeds to Graph Expansion
arxiv.org
·
1d
🌸
Bloom Filters
Bytes
as
Braille
engrenage.ch
·
4d
·
Discuss:
Hacker News
📜
Binary Philology
Show HN:I made
CyberChecker
after finding exposed
Stripe
keys in production
cyber-checker.com
·
6d
·
Discuss:
Hacker News
✅
Archive Fixity
Built with
Opus
4.6: a Claude Code
hackathon
cerebralvalley.ai
·
4d
·
Discuss:
Hacker News
🦀
Rust Macros
The
Null
Pointer
Crisis: Running God-Mode Software on Legacy Hardware
news.ycombinator.com
·
5d
·
Discuss:
Hacker News
🧪
Hardware Fuzzing
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
·
6d
·
Discuss:
Lobsters
,
Hacker News
🌳
Archive Merkle Trees
Loading...
Loading more...
« Page 20
•
Page 22 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help