🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌲 B+ Tree Forensics

Database Recovery, Page Analysis, Corruption Detection, Storage Archaeology

Official statement from Tea on their data leak
simonwillison.net·15h
🔤EBCDIC Privacy
How to prepare for a Mac device security audit
jamf.com·2d
🔗Data Provenance
InfoSec News Nuggets 7/23/2025
aboutdfir.com·3d
🔓Hacking
Artificial intelligence: Vibe coding service Replit deletes production database
heise.de·1d
🧮Z3 Solver
A deterministic π-driven algorithm for the Partition Problem (NP-complete)
osf.io·1d·
Discuss: Hacker News
🧮SMT Solvers
InNative – Run WebAssembly Outside the Sandbox at 95% Native Speed
innative.dev·8h·
Discuss: Hacker News
🕸️WebAssembly
Confessions of a static timing analysis tool
chipinsights.substack.com·2d·
Discuss: Substack
⚡Circuit Verification
[D] Do you think that Muon Optimizer can be viewed through the lens of explore-exploit?
reddit.com·23h·
Discuss: r/MachineLearning
🔲Lattice Cryptography
Evaluating Ensemble and Deep Learning Models for Static Malware Detection with Dimensionality Reduction Using the EMBER Dataset
arxiv.org·3d
🦠Malware Analysis
Digital Twin Technologies in Predictive Maintenance: Enabling Transferability via Sim-to-Real and Real-to-Sim Transfer
arxiv.org·2d
🔄Lens Laws
MuseAir hashing algorithm v0.4 released (currently Rust only)
github.com·2d·
Discuss: Hacker News
🔍MinHash Variants
Inference Gateway – Open-Source
github.com·14h·
Discuss: Hacker News
⚡gRPC
What is Machine Learning?
dev.to·6h·
Discuss: DEV
🧠Machine Learning
📈 Bug rate improvement after switching to workflow optimizat
dev.to·2h·
Discuss: DEV
⚙️Batch Processing
AI Revolution & Critical RCEs: A Dev's Digest on GitHub Spark & SharePoint Exploits (23/24-July-2025)
dev.to·3d·
Discuss: DEV
🔓Hacking
Zig Wants to Replace Go and Rust. Does It Have What It Takes?
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Refactoring in the Age of Unlimited Code Generation
worksonmymachine.substack.com·18h·
Discuss: Substack
🦀Rust Macros
Tuning Detections isn’t Hard Unless You Make it Hard
infosecwriteups.com·2d
🎯Threat Hunting
Inverted Indexes: A Step-by-Step Implementation Guide
chashnikov.dev·3d·
Discuss: Hacker News
🔍BitFunnel
Docker’s Biggest Security Threat: How Python Stops Container Attacks
thenewstack.io·2d
📦Container Security
Loading...Loading more...
AboutBlogChangelogRoadmap