🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Checking data integrity
eclecticlight.coΒ·4h
βœ…Checksum Validation
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comΒ·17h
🏺ZIP Archaeology
An engineer’s path from data loss to software preservation
softwareheritage.orgΒ·8h
πŸ”„Archival Workflows
W1seGuy | TryHackMe Walkthrough β€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comΒ·1d
πŸ”Cryptographic Archaeology
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.orgΒ·1d
🎡Audio ML
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comΒ·16h
❄Nix
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comΒ·15h
βš–οΈLegal Compliance
It is 1939 and you want to use public-key cryptography
shkspr.mobiΒ·2dΒ·
Discuss: Hacker News, shkspr.mobi
πŸ”Cryptographic Archaeology
How to test LUKS passphrase on specific key slot
sleeplessbeastie.euΒ·1d
πŸ”’Hardware Attestation
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceΒ·13h
πŸ”’Bitwise Algorithms
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.comΒ·1d
🧬Bitstream Evolution
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comΒ·2d
πŸ”NTLM Archaeology
Oxygen Tech Bytes in June 2025
forensicfocus.comΒ·1d
πŸ”Audio Forensics
Week 28 – 2025
thisweekin4n6.comΒ·2d
🏺Kerberos Archaeology
Windows Hello for Business – The Face Swap
insinuator.netΒ·21h
🎯NTLM Attacks
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comΒ·10hΒ·
Discuss: Lobsters, Hacker News
πŸ›‘οΈeBPF Security
New research connects quantum computing power to the security of cryptographic systems
phys.orgΒ·23h
πŸ”Quantum Security
Professional Meets Personal: Archivists and Their Family Archives
medium.comΒ·1d
🏠Personal Archiving
Software Security Imperative: Forging a Unified Standard of Care
thenewstack.ioΒ·20h
πŸ›‘Cybersecurity
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comΒ·21h
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap