🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Mary Queen of Scots’ political scheming revealed in decoded missing letters
the-independent.com·12h
🗝️Paleocryptography
Boomerang carved from mammoth tusk shows ‘Homo sapiens’ had symbolic thinking 42,000 years ago
english.elpais.com·6h
🦴Database Paleontology
New single-molecule magnet tech could unlock hard drives with 100x more capacity — drives could store three terabytes per square centimeter
tomshardware.com·11h·
Discuss: r/technews
🧲Magnetic Domains
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.com·1d
🔒Hardware Attestation
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·2d
🦠Malware Analysis
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.com·7h
🔓Hacking
Fixes for five Lix CVEs
lix.systems·2d·
Discuss: Lobsters
❄️Nix Adoption
Reflecting JSON into C++ Objects
brevzin.github.io·9h·
Discuss: Lobsters, Hacker News, r/cpp
🔧Binary Parsers
Deploying Pull Requests: A Complete AWS Stack for Every PR
metaduck.com·1h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·1d
🔓Hacking
SSL and TLS Deployment Best Practices
github.com·1d·
Discuss: Hacker News
🔐Certificate Analysis
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·1d
🎫Kerberos Attacks
Exploiting Android Components in Seconds
infosecwriteups.com·11h
⚡Performance Tools
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.to·1d·
Discuss: DEV
🎵Spectral Hashing
️ Stop API Key Leaks Before They Cost You — Meet KeySentry
infosecwriteups.com·2d
🚀Indie Hacking
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.com·1d
🚨Incident Response
North Korea - Cyber Threat Actor Profile
cstromblad.com·1d
🇸🇪Nordic Cryptography
Your Digital Self Is Not Your Own: How Moca Foundation's New Chain Plans to Give You Back Control
hackernoon.com·11h
🔗Blockchain Archives
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·13h
🔐CBOR
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap