🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔬 Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

How Open Data Editor empowers our weapon watch network
blog.okfn.org·1d
🔓Open Source Software
My Homelab, now in a 10" rack.
reddit.com·7h·
Discuss: r/homelab
🏠HomeLab
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·15h
🔍NTLM Forensics
Could Open Table Formats End the Reign of Snowflake and Databricks?
prequel.co·6h·
Discuss: Hacker News
📚MARC Evolution
I Figured Out What the Voynich Manuscript Says; It's Something More Than Words
dmerullo.substack.com·9h·
Discuss: Substack
🏰Manuscript Networks
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·9h·
Discuss: Hacker News
📋DFDL
Explaining software and computational methods
blog.khinsen.net·23h·
Discuss: Hacker News
📝Concrete Syntax
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.com·1d
🔄Burrows-Wheeler
Curating art exhibitions using machine learning
arxiv.org·19h
🏺Computational Archaeology
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·6h
🔒Linear Types
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.to·19h·
Discuss: DEV
🎵Spectral Hashing
Fast Capture of Cell-Level Provenance in Numpy
arxiv.org·1d
🔗Data Provenance
Build a Data Cleaning & Validation Pipeline in Under 50 Lines of Python
kdnuggets.com·1d
✅Archive Validation
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·10h
🦠Malware Analysis
FileFix – A ClickFix Alternative
mrd0x.com·1d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Show HN: Anagnorisis, local data-management with trainable recommendation engine
github.com·47m·
Discuss: Hacker News
🤖Archive Automation
Semantic-Aware Parsing for Security Logs
arxiv.org·1d
📝Log Parsing
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
Loading...Loading more...
AboutBlogChangelogRoadmap