🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Polish Cryptanalysis

Enigma Breaking, Mathematical Cryptology, Eastern European Security, Historical Codebreaking

Still Up. Still Evil
vulncheck.com·1d·
Discuss: Hacker News
🌐DNS Security
GITEX GLOBAL 2025
darkreading.com·20h
🛡Cybersecurity
Lewis Carroll and Zero Knowledge Proofs
johndcook.com·15h
🔐Hash Functions
Don't Expose Your IDs: An Introduction to Obfuskey in Python
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
IT Security Weekend Catch Up – August 1, 2025
badcyber.com·13h
🔓Hacking
Russian hacker group using Internet service providers to spy on foreign embassies
intelnews.org·4h
🔓Hacking
Hack The Box Academy Writeup — PASSWORD ATTACKS — Writing Custom Wordlists and Rules
infosecwriteups.com·1d
🔓Password Cracking
The Good, the Bad and the Ugly in Cybersecurity – Week 31
sentinelone.com·20h
🛡Cybersecurity
Quantum Complexity Theory Student Project Showcase #5 (2025 Edition)!
scottaaronson.blog·1d
🕸️Tensor Networks
Poland says 32 people detained and suspected of coordinating with Russia for sabotage
the-independent.com·3d
🔎OSINT Techniques
Wounded soldier escapes battlefield using e-bike delivered by drone
bbc.com·11h
🕵️Vector Smuggling
Threat Analysis - Public Administration - May -> July of 2025
cstromblad.com·1d
🕵️Penetration Testing
SOME: Symmetric One-Hot Matching Elector -- A Lightweight Microsecond Decoder for Quantum Error Correction
arxiv.org·1d
⚛️Quantum Error Correction
A new book reveals the mundane lives of Stasi agents spying often on family and friends.
dw.com·1d
🔐Soviet Cryptography
On This Day in Math - August 1
pballew.blogspot.com·1d·
Discuss: www.blogger.com
🍎Apple Computing
Surrealism is where you find it
boston.conman.org·1d
🕵️Steganographic Archives
2025: The Year of Intelligence 2.0 ? — 50 Years from the Church Committee to Russiagate Investigation [UPDATE: From TWA 800 to Russiagate: How the FBI Shaped Fa...
inteltoday.org·1d
🔎OSINT Techniques
Revolutionary ECC-256 Key Recovery via Quantum Collapse Algorithm
quantumtopology.substack.com·2d·
Discuss: Substack
🔐Quantum Cryptography
How to use ChatGPT to make it sound like you’re an expert on something, even if you know nothing
techradar.com·7h
🧠Personal Knowledge Base
SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks
securityscorecard.com·15h
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap