๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

how significant is your anomaly?
hoggresearch.blogspot.comยท1dยท
Discuss: hoggresearch.blogspot.com
๐ŸŒก๏ธPreservation Physics
TextIndex: Simple syntax for creating indexes in Markdown and text documents
mattgemmell.scotยท14hยท
Discuss: Hacker News
๐Ÿ“‡Indexing Strategies
We built audio/video RAG
ragie.aiยท3dยท
Discuss: Hacker News
๐Ÿ’ฟFLAC Archaeology
10,000 CCTV exhibits and 1,800 devices submitted to Cyber Crime Centre this year
the-independent.comยท20h
โš–๏ธDigital Evidence
Rust Embedded Drivers (RED) - Open Source Book
reddit.comยท8hยท
Discuss: r/rust
๐Ÿฆ€Embedded Rust
From Jio Mobile to NASA HOF: My Unconventional Path into Cybersecurity
infosecwriteups.comยท3h
๐Ÿ”“Hacking
Cloud Logging for Security and Beyond
unit42.paloaltonetworks.comยท3d
๐Ÿ“Log Parsing
Hacker plants three strains of malware in a Steam Early Access game called Chemia โ€” security company found crypto-jacking infostealers and a backdoor to install...
tomshardware.comยท15h
๐Ÿš€Indie Hacking
Nexus โ€“ Lovable for Desktop Apps
github.comยท4hยท
Discuss: Hacker News
๐ŸบZIP Archaeology
The Polymath Tool for All Your Audio and Document Needs
dev.toยท2hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
ASP-Assisted Symbolic Regression: Uncovering Hidden Physics in Fluid Mechanics
arxiv.orgยท1d
โœจEffect Handlers
A bizarre new Linux malware can be found hiding in cute animal photos
techradar.comยท19h
๐Ÿ”“Hacking
AI's Rapid Role in Spotting Fake News
dev.toยท10hยท
Discuss: DEV
๐Ÿ“ฐRSS Reading Practices
Show HN: Zbench, RAG evals using chess Elo ratings
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Information Retrieval
Machine Learning Fundamentals: gradient descent
dev.toยท1dยท
Discuss: DEV
๐ŸŽตAudio ML
Koske, a new AI-Generated Linux malware appears in the threat landscape
securityaffairs.comยท1d
๐Ÿ”“Hacking
Personalized AI is rerunning the worst part of social media's playbook
helentoner.substack.comยท39mยท
Discuss: Substack
๐ŸŽ›๏ธFeed Filtering
One Tool to Rule JWTs โ€” Easy JWT Pentesting with JWTAuditor
infosecwriteups.comยท1d
๐ŸŽซKerberos Attacks
Evaluating Ensemble and Deep Learning Models for Static Malware Detection with Dimensionality Reduction Using the EMBER Dataset
arxiv.orgยท2d
๐Ÿฆ Malware Analysis
GMDSOFT Tech Letter Vol .13 Smart Ring Artifact Analysis: Oura
forensicfocus.comยท4d
๐Ÿ”Audio Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap