🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·13h·
Discuss: Lobsters, Hacker News
🛡️RISC-V Security
Async BOFs – “Wake Me Up, Before You Go Go”
outflank.nl·1h
🔍eBPF
VMware patches some critical security vulnerabilities
heise.de·1h
🏠Homelab Security
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.com·2h
💣ZIP Vulnerabilities
Dry Run: Your Kubernetes network policies with Calico staged network policies
tigera.io·23h
📦Container Security
Transitioning from Linux to FreeBSD
discoverbsd.com·2d
🔌Operating system internals
Critical UEFI vulnerabilities found in Gigabyte motherboards — allow attackers to bypass Secure Boot and install firmware backdoors
tomshardware.com·23h
🔒Secure Boot
LuCI on MGMT - Day 7
dev.to·9h·
Discuss: DEV
📻Homebrew Protocols
A Programmer’s Guide to x86-64 Assembly (Series Overview)
blog.codingconfessions.com·8h
🔧RISC-V Assembler
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.com·1d
🦠Malware Analysis
Windows Hello for Business – The Face Swap
insinuator.net·1d
🎯NTLM Attacks
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.com·20h
👁️Observatory Systems
Sharing an OMV folder across VLANs, how vulnerable would this be?
i.redd.it·1d·
Discuss: r/homelab
💿Proxmox HA
MCP: A Practical Security Blueprint for Developers
thenewstack.io·17h
🔓Hacking
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.com·15h·
Discuss: Hacker News
🌐WASI
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.biz·9h
🔓Hacking
Google Cloud Oddities Summer 2025 Edition
sven.stormbind.net·1h
⚡gRPC
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.dev·1d·
Discuss: Lobsters, Hacker News
🌐Network Protocols
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·13m
📡Bluetooth Archaeology
NixOS: Declarative Management, Imperative Privilege Escalation
labs.snyk.io·13h·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
Loading...Loading more...
AboutBlogChangelogRoadmap