๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฌ Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chยท9h
๐Ÿ—ƒ๏ธDatabase Storage
Google Cache Is Gone, I Like This Way Better: How to View Archived Websites
pcmag.comยท5hยท
Discuss: Hacker News
๐ŸŒWeb Archiving
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท16hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท6h
๐Ÿฆ Malware Analysis
Why document-borne malware needs to be back on the radar for organization
techradar.comยท1d
๐Ÿ”“Hacking
WinRAR exploit enables attackers to run malicious code on your PC โ€” critical vulnerability patched in latest beta update
tomshardware.comยท4h
๐Ÿ’ฃZIP Vulnerabilities
Show HN: A free tool to extract audio from video
extractaudio.proยท2hยท
Discuss: Hacker News
๐ŸŽงFLAC Encoding
Explaining software and computational methods
blog.khinsen.netยท18h
๐Ÿ“Concrete Syntax
Deploy Now, Explain Never? Why AI Needs Forensic Parity
muckypaws.comยท1d
๐Ÿ’พPersistence Strategies
How Open Data Editor empowers our weapon watch network
blog.okfn.orgยท1d
๐Ÿ”“Open Source Software
What LLMs Know About Their Users
schneier.comยท7hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comยท15hยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท3h
๐ŸŽฏThreat Hunting
My Homelab, now in a 10" rack.
reddit.comยท2hยท
Discuss: r/homelab
๐Ÿ HomeLab
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท10h
๐Ÿ”NTLM Forensics
Could Open Table Formats End the Reign of Snowflake and Databricks?
prequel.coยท48mยท
Discuss: Hacker News
๐Ÿ“šMARC Evolution
I Figured Out What the Voynich Manuscript Says; It's Something More Than Words
dmerullo.substack.comยท3hยท
Discuss: Substack
๐ŸฐManuscript Networks
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท14hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท9h
๐ŸŽซKerberos Attacks
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท1d
๐Ÿฆ Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap