🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌲 B-tree Forensics

Database Recovery, Page Analysis, Corruption Detection, Storage Archaeology

Digital Forensics Round-Up, August 06 2025
forensicfocus.com·9h
🔐Archive Cryptanalysis
DBAIOps: A Reasoning LLM-Enhanced Database Operation and Maintenance System using Knowledge Graphs
arxiv.org·1d
🧮Datalog
Crypto Recovery Specialist – Blockchain Investigator – Helping Victims Reclaim
news.ycombinator.com·3h·
Discuss: Hacker News
⛏️File Carving
An easy-to-implement, arena-friendly hash map
nullprogram.com·3h·
Discuss: Lobsters
🔐Hash Functions
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·15h
🛡️eBPF Security
Transaction Healing: Scaling Optimistic Concurrency Control on Multicores
muratbuffalo.blogspot.com·12h·
Discuss: www.blogger.com
⚡Hardware Transactional Memory
Building a Home Lab for Self-Hosting & Cybersecurity Labs - What Do You Think of This Setup ?
preview.redd.it·9h·
Discuss: r/homelab
🏠HomeLab
p-fast trie, but smaller
dotat.at·7h·
Discuss: Hacker News
🌳Trie Structures
How To Solve Every Programming Problem
blog.codeminer42.com·5h
📐Interval Arithmetic
New Research on HEVC Video Double Encoding Detection Published in Journal of Imaging
blog.ampedsoftware.com·11h
🖼️JPEG Forensics
Why Computer Science Is No Good, Redux
cacm.acm.org·1d
🎯Performance Proofs
Accessing data on the new server is slower than it was on a 10 year old server
forums.anandtech.com·1d
💿Proxmox HA
'ReVault' Security Flaws Impact Millions of Dell Laptops
darkreading.com·4h
🔓Hacking
(Not) Strange Bedfellows – Samsung’s Rubin & Digital Wellbeing
thebinaryhick.blog·2h
🔒Secure Boot
The DB Grill
db-grill.com·1d·
Discuss: Hacker News
🦀Rusty Databases
External Network Penetration Testing and Best Practices
hackerone.com·8h
🕵️Penetration Testing
How Hash Maps Work
hackernoon.com·12h
🔐Hash Functions
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.com·10h
🛡Cybersecurity
HTTP/1.1 Must Die: What This Means for Contract Pentesters and MSSPs
portswigger.net·2h
🛣️BGP Hijacking
Consistency over Availability: How rqlite Handles the CAP theorem
philipotoole.com·8h·
Discuss: Hacker News
🛡️Byzantine Fault Tolerance
Loading...Loading more...
AboutBlogChangelogRoadmap