๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Š Acoustic Forensics

Sound Authentication, Audio Evidence, Historical Voice Recovery, Frequency Analysis

A Robust Method for Pitch Tracking in the Frequency Following Response using Harmonic Amplitude Summation Filterbank
arxiv.orgยท21h
๐ŸŒˆSpectral Audio
A Standard for Human-Centered Investigation Playbooks
chrissanders.orgยท7h
๐ŸŽฏThreat Hunting
Show HN: A free tool to extract audio from video
extractaudio.proยท9hยท
Discuss: Hacker News
๐ŸŽงFLAC Encoding
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท11h
๐Ÿ”ฌArchive Forensics
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท21hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
Modernizing eDiscovery: A Huge Strategic Win for Legal Operations Executives
blog.x1discovery.comยท6h
๐Ÿ”—Data Provenance
Beyond Theory โ€“ Interview with Jill Delaney by Juan Alonso
ica.orgยท10h
๐Ÿ›๏ธPREMIS
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comยท22hยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท17h
๐Ÿ”NTLM Forensics
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.comยท2d
๐Ÿ’พPersistence Strategies
Is this video of a Tehran prison explosion AI-generated?
abc.net.auยท1d
๐ŸŽž๏ธMKV Analysis
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท2d
๐Ÿ”“Password Cracking
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.comยท7h
๐ŸŽซKerberos Exploitation
Testing AirPods 4โ€™s Beta Update and Improved Recording Quality for Voice Notes
macstories.netยท6h
๐ŸŽตAudio Codecs
Inworld TTS: 20x cheaper, state-of-the-art, text-to-speech
inworld.aiยท8hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
The Inefficiency in Digital Forensics
cyb3rops.medium.comยท2d
๐ŸšจIncident Response
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toยท4hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท10h
๐ŸŽฏThreat Hunting
Human Voice is Unique
arxiv.orgยท1d
๐Ÿ‘‚Audio Evidence
USAD: Universal Speech and Audio Representation via Distillation
arxiv.orgยท1d
๐ŸŽตAudio ML
Loading...Loading more...
AboutBlogChangelogRoadmap