🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Password Cracking

Hashcat, John the Ripper, Rainbow Tables, GPU Acceleration

Should we preserve the pre-AI internet before it is contaminated?
newscientist.com·1d
🌡️Preservation Entropy
Free Things Are Complicated (Especially the Sphere Spectrum!)
grossack.site·2d
🧮Algebraic Archives
It’s Not Just a Game Anymore
afterbabel.com·1d·
Discuss: Hacker News
🕹️Game Preservation
PySimpleGUI Shutdown
pysimplegui.com·1d·
Discuss: Hacker News
🔓Open Source Software
Nobu Hotel, Barcelona review
the-independent.com·7h
🧮Algorithmic Cooking
After Discovering Poshmark’s Hidden ‘Bulk Actions’ Tools, I'm Reconsidering My $30 PrimeLister Subscription
lifehacker.com·55m
🔃Feed Algorithms
Israel Expands Attacks in Central Gaza City and Raids W.H.O. Offices
nytimes.com·5h
📡RSS
Boot exploit for software-bricked Nintendo WII U consoles discovered by repairing destroyed and discarded SD cards from factory — team posts 'paid the beak' exp...
tomshardware.com·3d
🎮Cartridge Archaeology
JOVE – Jonathan’s Own Version of Emacs (1983)
github.com·5d·
Discuss: Hacker News
📺VT100 Emulation
Best Productivity App!
dev.to·17h·
Discuss: DEV
📄Document Digitization
ToolShell Threat Brief: SharePoint RCE Vulnerabilities (CVE-2025-53770 & 53771) Explained
bitsight.com·3h
🔓Hacking
OpenAI pushes ahead with Stargate as SoftBank remains absent from data center development
the-decoder.com·1h
💿ZFS Archaeology
Update: New version of Sharepoint 2016 fixes toolshell vulnerability
heise.de·9h
🔓Hacking
Designing an Open Source Multimeter: the HydraMeter
hackaday.com·1d
📻Homebrew Protocols
Linux and Secure Boot certificate expiration
lwn.net·3d·
Discuss: Lobsters, Hacker News
🔒Secure Boot
Math Fractions Teacher Helper
dev.to·2d·
Discuss: DEV
⚔️Lean Tactics
🚀 Just published my latest open-source project: WiFi Profiler!
dev.to·5h·
Discuss: DEV
📡Network Monitoring
SymbOS Is a Funhouse mirror look at a future that never was
hackaday.com·2d
🖥Retro Computing
How to Build a Full AI Workflow Without Code or APIs
dev.to·5h·
Discuss: DEV
⚔️Lean Tactics
Cybersecurity Snapshot: AI Security Tools Embraced by Cyber Teams, Survey Finds, as Vulnerability Research Gets a Boost from UK Cyber Agency
tenable.com·4d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap