🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Password Cracking

Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration

Debugging the Instant Macropad
hackaday.com·1d
📺VT100
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.net·12h
📡Network Monitoring
The Resurgence of IoT Malware: Inside the Mirai-Based Gayfemboy Botnet Campaign
fortinet.com·2h·
Discuss: Hacker News
🌐DNS Security
Local LLMs and Ollama
groveronline.com·19h
🕸️WASM Archives
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.org·12h·
Discuss: Lobsters, Hacker News, r/programming
⚡Hardware Transactional Memory
The AVX-512 thread
forums.anandtech.com·17h
🧲RISC-V Archaeology
Block unsafe prompts targeting your LLM endpoints with Firewall for AI
blog.cloudflare.com·13h
🛡️CLI Security
Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
zscaler.com·8h·
Discuss: Hacker News
🦠Malware Analysis
Guessing Game: Haskell Style
entropicthoughts.com·1d
👑Dependent Haskell
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
jacobasper.com·1d·
Discuss: Hacker News
🦀Rusty Databases
The Day I Logged in with a Hash
gsociety.fr·2d·
Discuss: Hacker News
🔓Hacking
Encoding sortable binary database keys
stately.cloud·7h·
Discuss: Hacker News
💾Database Formats
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.com·1d·
Discuss: Hacker News
🕵️Vector Smuggling
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.com·13h
📐Geometric Hashing
Using Real Survey Data to Create Authentic AI Personas for Extended Research
askrally.com·14h·
Discuss: Hacker News
🏛Digital humanities
Canary tokens: Learn all about the unsung heroes of security at Grafana Labs
grafana.com·6h·
Discuss: Hacker News
🏺Kerberos Archaeology
Why I’m Against Claude Code’s Grep-Only Retrieval? It Just Burns Too Many Tokens
milvus.io·2d·
Discuss: Hacker News
🌳Incremental Parsing
Drama Model Inference Efficiency Boosted by 1.7x-2.3x
pytorch.org·3h·
Discuss: Hacker News
🚀SIMD Text Processing
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·1d
🛡️ARM TrustZone
The Lobster Programming Language
strlen.com·1d·
Discuss: Hacker News
🔗Concatenative Programming
Loading...Loading more...
AboutBlogChangelogRoadmap