🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ ZIP Vulnerabilities

Directory Traversal, Zip Bombs, Archive Security, Format Exploitation

A Lot of Packets
funcall.blogspot.comΒ·5dΒ·
Discuss: www.blogger.com
πŸ“‘Network Archaeology
A Regular Expression Matcher Code: Rob Pike, exegesis by Brian Kernighan
cs.princeton.eduΒ·2d
πŸ”RegEx Engines
How to optimize for password-free checkout experiences
fingerprint.comΒ·1d
πŸ”“Password Cracking
Modular PIC C2 Agents
rastamouse.meΒ·3d
🌐WASI
SharePoint hacking campaign affects hundreds of systems worldwide
cybersecuritydive.comΒ·12h
πŸ”“Hacking
Project Lyra – Exploring Interstellar Objects
i4is.orgΒ·23hΒ·
Discuss: Hacker News
🏺Computational Archaeology
Integration testing for Go applications using Testcontainers
devblogs.microsoft.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Concolic Testing
Foreword for Fuzz Testing Book
pages.cs.wisc.eduΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ›Fuzzing
SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know
blog.checkpoint.comΒ·2d
πŸ”“Hacking
Spotify had to pull an AI-generated song that claimed to be from an artist who passed away 36 years ago
techradar.comΒ·1d
πŸ”FLAC Forensics
Show HN: An OCR PDF large batch renaming tool
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
The Hidden Risk in ERP Automation: How One Bad Sentence Can Cost Your Company Millions
hackernoon.comΒ·22h
⚑Proof Automation
Technical approach for classifying human-AI interactions at scale
microsoft.comΒ·12hΒ·
Discuss: Hacker News
πŸŒ€Brotli Internals
Critical Infrastructure Security Is a Critical Concern
darkreading.comΒ·1d
πŸ›‘Cybersecurity
Exposing to the internet without VPN on default ports... are the risks exaggerated?
reddit.comΒ·1dΒ·
Discuss: r/homelab
πŸ”“Hacking
Building Code Craft in 6 Days: My AI Hackathon Journey with Bolt
dev.toΒ·17hΒ·
Discuss: DEV
πŸš€Indie Hacking
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers
arxiv.orgΒ·1d
πŸ’»Local LLMs
SharePoint β€˜ToolShell’ vulnerabilities being exploited in the wild
news.sophos.comΒ·2d
🎫Kerberos Exploitation
Architectural Degradation: Definition, Motivations, Measurement and Remediation Approaches
arxiv.orgΒ·2d
🏺Format Archaeology
China-Backed APT41 Cyberattack Surfaces in Africa
darkreading.comΒ·1d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap