🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎼 Acoustic Analysis

Sound Authentication, Audio Verification, Voice Forensics, Frequency Investigation

Adaptive Acoustic Anomaly Detection via Hybrid Kalman-Particle Filtering in Underwater Sensor Networks
dev.to·11h·
Discuss: DEV
🎵Acoustic Fingerprinting
Digital Forensics Round-Up, August 06 2025
forensicfocus.com·10h
🔐Archive Cryptanalysis
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·1d
💿DAT Forensics
Using AI to generate a JUCE tutorial
github.com·1d·
Discuss: Hacker News
🎼Audio Lambda Calculus
Tech Minds: Testing the ATS Decoder Mega SDR Radio
rtl-sdr.com·27m
📻Homebrew Protocols
External Network Penetration Testing and Best Practices
hackerone.com·10h
🕵️Penetration Testing
Amplitude, Inc. (AMPL) Q2 2025 Earnings Call Transcript
seekingalpha.com·56m
🌈Spectral Audio
Fast Algorithm for Moving Sound Source
arxiv.org·22h
👁️Perceptual Coding
Crypto Recovery Specialist – Blockchain Investigator – Helping Victims Reclaim
news.ycombinator.com·5h·
Discuss: Hacker News
⛏️File Carving
Sandro talks RTC Security with Safety Detectives
enablesecurity.com·1d
📞WebRTC
Spatial Audio in a Hat
hackaday.com·1d
🎯Tape Azimuth
The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
portswigger.net·4h
🛣️BGP Hijacking
Microsoft enabled Israeli spy agency's mass surveillance of Palestinians' mobile calls
metacurity.com·12h
🔓Hacking
DF/IR Paralysis: What to Do When You Don’t Know What to Do
brettshavers.com·10h
👂Audio Evidence
Taking the bitter lesson to heart for speech-to-speech models
metavoice.io·4h·
Discuss: Hacker News
🎙️Whisper
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.com·11h
🛡Cybersecurity
My blog on zero-knowledge cryptography
kaw101010.github.io·1h·
Discuss: Hacker News
🔐Quantum Security
Cyber Security and Intelligence Report 2025
digitalforensicsmagazine.com·12h
🚨Incident Response
How Top CISOs Are Saving Their SOCs From Alert Overload (And Finally Catching Real Threats)
infosecwriteups.com·11h
🦠Malware Analysis
Account defender vs. Fingerprint: Why device intelligence provides greater coverage against fraud
fingerprint.com·8h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap