🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Checking data integrity
eclecticlight.co·9h
✅Checksum Validation
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·1h
🔓Password Cracking
Digital Forensics Round-Up, July 16 2025
forensicfocus.com·59m
🚨Incident Response
An engineer’s path from data loss to software preservation
softwareheritage.org·13h
🔄Archival Workflows
Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5
synacktiv.com·4h·
Discuss: Lobsters, Hacker News
🔒Hardware Attestation
OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
tenable.com·2h
🔐CBOR
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.com·22h
🏺ZIP Archaeology
W1seGuy | TryHackMe Walkthrough — XOR? BrUt3_F0rC3 iT
infosecwriteups.com·2d
🔐Cryptographic Archaeology
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·2h
📡Bluetooth Archaeology
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.org·3h
🎯NTLM Attacks
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.com·4h
💣ZIP Vulnerabilities
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·11h
🧮Z3 Solver
Police dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader
fortra.com·1h
🏢Active Directory
How to test LUKS passphrase on specific key slot
sleeplessbeastie.eu·1d
🔒Hardware Attestation
Salt Typhoon 'extensively' compromised a state national guard network for months
metacurity.com·1h
🛡Cybersecurity
It is 1939 and you want to use public-key cryptography
shkspr.mobi·3d·
Discuss: Hacker News, shkspr.mobi
🔐Cryptographic Archaeology
Unmoved Centre - NixOS Secrets Management
unmovedcentre.com·22h
❄Nix
Next Gen TTPs in the Threat Actor's Playbook
cofense.com·10h
🎯NTLM Attacks
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.com·1d
🧬Bitstream Evolution
Week 28 – 2025
thisweekin4n6.com·3d
🏺Kerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap