๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Browser Exploitation

Chromium,Exploit Development,Fuzzer Development,Android,AOSP,0 day

Legal Corner: Bringing SumUp to compliance: a case study of license enforcement
fsfe.orgยท15h
๐Ÿ’ฅExploit Development
Save mother nature โ€” one refurbished laptop at a time
boingboing.netยท23h
๐Ÿฆ€Rust
AmiBrowser: the Chromium engine running on a Linux host talking to a 68K Amiga application running inside a 68K emulator
osnews.comยท5d
๐Ÿฆ€Rust
GenAI assistants integrate LLMs into browser extensions to provide services such as translations, summaries and note taking
ucdavis.eduยท1d
๐Ÿฆ€Rust
How to motivate yourself to do hard things & Sending files of any size fast
creativerly.comยท1d
๐Ÿฆ€Rust
What if the files you havenโ€™t opened in a year justโ€ฆ Disappeared?
osnews.comยท1h
๐Ÿ”Reverse Engineering
Linux Gets HDR Support in Chromium on Wayland
linuxiac.comยท3h
๐Ÿฆ€Rust
The Unseen Battleground: An Architectโ€™s Retro on Streaming 1 Billion Minutes of Live Sports
hackernoon.comยท8h
๐Ÿฆ€Rust
WinRAR Flaw Exploited as Zero-Day to Spread RomCom Malware in Phishing Attacks
blogger.comยท4d
๐Ÿ’ฅExploit Development
Improvement of SRE skills
reddit.comยท7hยท
Discuss: r/kubernetes
๐Ÿ’ฅExploit Development
Patch now! Attacks on Fortinet IT security solutions may be imminent
heise.deยท2d
๐Ÿ’ฅExploit Development
๐Ÿš€From Zero to Hero: How I Integrated AI-Driven Prompt Engineering into My Dev Workflow
dev.toยท4hยท
Discuss: DEV
๐Ÿฆ€Rust
It Kinde of works - Part 1 of many
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ€Rust
Lenovo's Lena AI chatbot could be turned into a secret hacker with just one question
techradar.comยท22h
๐Ÿ’ฅExploit Development
NEAR vs Bitcoin: The Developer Comparison Nobody Wants to Have (But We Need To)
dev.toยท7hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
100 Days of DevOps: Day 17
dev.toยท5hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
๐Ÿ BusyBee: Fast & Observable Background Job Processing for .NET
dev.toยท1hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐Ÿ’ฅExploit Development
Two Hours With Cursor Changed How I See AI Coding
hackernoon.comยท8h
๐Ÿฆ€Rust
Pivoting from Auth0 to PHP Symfony
dev.toยท8mยท
Discuss: DEV
๐Ÿ”’Security
Loading...Loading more...
AboutBlogChangelogRoadmap