🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 ZIP Vulnerabilities

Directory Traversal, Zip Bombs, Archive Security, Format Exploitation

NixOS: Declarative Management, Imperative Privilege Escalation
labs.snyk.io·3h·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.com·14h
🦠Malware Analysis
Advanced PDF Optimization Techniques - 1752612
dev.to·7h·
Discuss: DEV
📝Text Compression
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·3h
🔓Hacking
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·3h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Fileless DPAPI Credential Extraction With PowerShell
infosecwriteups.com·1d
🎯NTLM Attacks
Sharing an OMV folder across VLANs, how vulnerable would this be?
i.redd.it·1d·
Discuss: r/homelab
💿Proxmox HA
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.org·2d
🌐DNS Security
ControlPlane Local Privilege Escalation Vulnerability on macOS
blog.quarkslab.com·1d
👑RISC-V Privilege
Valuable News Summary for 2025/07/14
discoverbsd.com·14h
🔌Operating system internals
How do you structure your "shared" internal packages in a monorepo?
reddit.com·14h·
Discuss: r/golang
📦Content Addressable
Hackers are abusing 'FileFix' technique to drop RATs during ransomware attacks
techradar.com·14h
🔓Hacking
A distributed systems reliability glossary
antithesis.com·12h·
Discuss: Lobsters, Hacker News, r/programming
✅Archive Fixity
Building Robust Filesystem Interactions in Rust
tangramvision.com·7h·
Discuss: Hacker News
📂Directory Synchronization
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.com·10h
🏺ZIP Archaeology
Parsing Safetensors File Format in C
leetarxiv.substack.com·12h·
Discuss: Substack, r/programming
✅Format Verification
What you need to know about CVSS to protect your IT assets
kaspersky.com·12h
🔓Hacking
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.com·13h
🦀Rust Verification
Windows Hello for Business – The Face Swap
insinuator.net·14h
🎯NTLM Attacks
Adversary Infrastructure and Indicators Behind the SAP NetWeaver 0-Day Exploitation
research.kudelskisecurity.com·1d
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap