๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฃ ZIP Vulnerabilities

Directory Traversal, Zip Bombs, Archive Security, Format Exploitation

How to (Almost) solve cybersecurity once and for all
adaptive.liveยท21hยท
Discuss: Hacker News
๐Ÿ”Systems Hardening
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deยท9h
๐ŸŽซKerberos Exploitation
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
iPRES Digital Preservation Bake Off 2025 - Amuse Bouche Challenge: Tiny Tools, Tasty Wins
ipres2025.nzยท2d
๐Ÿ”„Archival Workflows
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comยท10h
๐Ÿ”“Hacking
Research Worth Reading Week 25/2025
pentesterlab.comยท2d
๐ŸŒณArchive Merkle Trees
IBM Storage Protect Server is vulnerable to authorization bypass attack
ibm.comยท1dยท
Discuss: Hacker News
๐ŸขIBM Mainframes
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.orgยท1d
๐Ÿ›ก๏ธeBPF Security
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท1d
๐Ÿ’ฟOptical Forensics
HariSekhon/DevOps-Bash-tools
github.comยท16h
๐ŸšShell Automation
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comยท8h
๐ŸŽฏThreat Hunting
Show HN: Supply Chain Security at Scale โ€“ Insights into NPM Account Takeovers
laburity.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆPackage Managers
Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.comยท10h
๐Ÿ”’Secure Boot
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท9h
๐ŸŽซKerberos Attacks
Former US Army Sergeant pleads guilty after amateurish attempt at selling secrets to China
theregister.comยท2dยท
Discuss: r/privacy
๐Ÿ”“Hacking
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toยท5hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท3hยท
Discuss: Substack
๐Ÿฆ€Rust Macros
15 Critical Steps to Secure Your Linux Server: Complete Security Guide
dev.toยท1dยท
Discuss: DEV
๐Ÿ Homelab Security
Week 25 โ€“ 2025
thisweekin4n6.comยท3d
๐ŸŒWARC Forensics
Agents can be used for RCE via malicious packages
mrveera.devยท1dยท
Discuss: Hacker News
โšกProof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap