🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Free Hacking Ebooks and Security Ebooks Download Links
blackmoreops.com·2d
🔓Hacking
Going to DEFCON? See my talk, "We are currently clean on OPSEC": The Signalgate Saga
micahflee.com·1d
🕳️Information Leakage
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
research.checkpoint.com·2d
🌐DNS Security
Cobalt Strike Beacon delivered via GitHub and social media
securelist.com·4d
🎫Kerberos Exploitation
The Czech criminal code now bans the promotion of communist ideology, making it equivalent to Nazi propaganda.
dw.com·10h
🇨🇿Czech Computers
The fastest thing known to man is all set to make your PCs & phones "1000 times faster"
neowin.net·1d·
Discuss: Hacker News
⚛️Quantum Tape
Three bad things: threads, garbage collection, and nondeterministic destructors
apenwarr.ca·2h·
Discuss: Hacker News
🧠Separation Logic
Building a Distributed Redis Clone from Scratch – Part 1: In-Memory KV Store with TCP
beyondthesyntax.substack.com·5h·
Discuss: Substack, r/programming
🌊Streaming Databases
SOME: Symmetric One-Hot Matching Elector -- A Lightweight Microsecond Decoder for Quantum Error Correction
arxiv.org·2d
⚛️Quantum Error Correction
The Hidden War in AI: Unmasking the Threats Behind 2025’s Smartest Systems
dev.to·14h·
Discuss: DEV
🕵️Vector Smuggling
Exploiting vulnerabilities in the Blink video doorbell
jacksondonaldson.com·1d·
Discuss: Hacker News
🛡️RISC-V Security
class 10 mathematics
dev.to·1h·
Discuss: DEV
🧮Z3 Applications
Expose and Circumvent SNI-Based QUIC Censorship of the Great Firewall of China
gfw.report·1d·
Discuss: Hacker News
🌐DNS over QUIC
Converting Python Bytes to Hex
dev.to·3d·
Discuss: DEV
🔤Character Encoding
Show HN: Axilöck – VCS Agnostic Secret Prevention
blog.axilock.ai·4h·
Discuss: Hacker News
💣Compression Security
Python Data Structures: Lists, Tuples, and Dictionaries Explained
dev.to·2d·
Discuss: DEV
🗂Data structures
New Linux backdoor Plague bypasses auth via malicious PAM module
securityaffairs.com·11h
🔓Hacking
A Letter to the Future
nytimes.com·1d
🏠Personal Archives
[R] From Taylor Series to Fourier Synthesis: The Periodic Linear Unit
reddit.com·1d·
Discuss: r/MachineLearning
🎛️Audio Synthesis
Python Data Wrangling: Pandas and Polars, A Comparison
hackernoon.com·2d
🧠Query Planners
Loading...Loading more...
AboutBlogChangelogRoadmap