🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ ZIP Vulnerabilities

Directory Traversal, Zip Bombs, Archive Security, Format Exploitation

WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·24m
πŸ’£Compression Security
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
❄️Nixpkgs
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·1h
πŸ”“Hacking
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·17hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·5h
πŸ”NTLM Forensics
IP Sentry (Golang)
dev.toΒ·21hΒ·
Discuss: DEV
πŸ›‘οΈeBPF Security
How keys are used in FileVault and encryption
eclecticlight.coΒ·7h
πŸ’£Compression Security
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·1h
🦠Malware Analysis
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devΒ·20hΒ·
Discuss: Hacker News
🎯NTLM Attacks
Fixes for five Lix CVEs
lix.systemsΒ·22hΒ·
Discuss: Lobsters
❄️Nix Adoption
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.orgΒ·1d
πŸ›‘Cybersecurity
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
Program Execution, follow-up
windowsir.blogspot.comΒ·1hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Directory Opus
gpsoft.com.auΒ·1d
πŸ”ŒOperating system internals
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·16h
πŸ”—Data Provenance
FileFix – A ClickFix Alternative
mrd0x.comΒ·1dΒ·
Discuss: Hacker News
🏺ZIP Archaeology
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.comΒ·1d
🏺Kerberos Archaeology
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·17hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deΒ·4h
🎫Kerberos Exploitation
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comΒ·5h
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap