🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Polish Cryptanalysis

Enigma Breaking, Mathematical Cryptology, Eastern European Security, Historical Codebreaking

A safer memcpy with very limited use cases
subethasoftware.com·23h
🧪Binary Fuzzing
How the US needs to prepare for a higher-level war, according to an American special ops trainer in Ukraine
businessinsider.com·1d
🇷🇺Russian Computing
Major Update: Private AI Recs
blog.thenewoil.org·36m
🤖AI Curation
OTW - Bandit Level 0 to Level 1
tbhaxor.com·1d
🛡️CLI Security
Selfies, 4chan, and a war of the sexes: Lessons from the hacking of Tea
english.elpais.com·12h
🔓Hacking
Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations
forensicfocus.com·2d
🚨Incident Response
Don't Expose Your IDs: An Introduction to Obfuskey in Python
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
In Search of Riches, Hackers Plant 4G-Enabled Raspberry Pi In Bank Network
it.slashdot.org·1d
🔓Hacking
Deriving Rope the Proper Way
nor-blog.pages.dev·1d·
Discuss: Hacker News
📐Linear Algebra
Authorities seize BlackSuit ransomware gang’s servers
techcrunch.com·1d
🔓Hacking
Poland says 32 people detained and suspected of coordinating with Russia for sabotage
the-independent.com·4d
🔎OSINT Techniques
We're Losing the Global War on End-to-End Encryption
community.qbix.com·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
Python Data Wrangling: Pandas and Polars, A Comparison
hackernoon.com·1d
🧠Query Planners
The Art of Multiprocessor Programming 2nd Edition Book Club
eatonphil.com·3h·
Discuss: Hacker News
⚡Cache Theory
AI and the Democratization of Cybercrime
cacm.acm.org·2d
🎯Threat Hunting
Read This Before You Trust Any AI-Written Code
gizmodo.com·1d·
Discuss: Hacker News
🔓Hacking
miniHDL: A Python Hardware Description Language DSL
nicholas.carlini.com·1d·
Discuss: Hacker News
⚡Circuit Design
ASCII Art Signatures in the Wild (2012)
geon.github.io·1d·
Discuss: Hacker News
🔧KAITAI
Cobalt Strike Beacon delivered via GitHub and social media
securelist.com·3d
🎫Kerberos Exploitation
PesudoCLI - your AI man pages.
dev.to·4h·
Discuss: DEV
⚡Redis Internals
Loading...Loading more...
AboutBlogChangelogRoadmap