Beginner’s guide to malware analysis and reverse engineering
intezer.com·15h
🦠Malware Analysis
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·11h
🔧Binary Parsers
Forensic journey: hunting evil within AmCache
securelist.com·2d
🔍Disk Forensics
Ghosts of Unix Past: a historical search for design patterns (2010)
lwn.net·7h·
🏠Homelab Archaeology
EditTrack: Detecting and Attributing AI-assisted Image Editing
arxiv.org·1d
🔍Vector Forensics
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.eu·1d
🔍NTLM Forensics
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.com·4h
👂Audio Evidence
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·20h
🦠Malware Analysis
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.com·14h
🔗Binary Similarity
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·4d
💿FLAC Archaeology
Node.js Performance: Processing 14GB Files 78% Faster with Buffer Optimization
pmbanugo.me·1d·
Discuss: Hacker News
🌊Stream Processing
Spot trouble early with honeypots and Suricata
pentestpartners.com·1d
🛡️eBPF Security
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·1d·
Discuss: Hacker News
🦠Malware Analysis
Exploring Data Extraction from iOS Devices: What Data You Can Access and How
blog.digital-forensics.it·2d·
🍎Apple Archive
What Makes a Language Look Like Itself?
towardsdatascience.com·21h
🔤Character Classification
From the Browser to the Bloodstream
puri.sm·20h
🔗Data Provenance
Product comparison: Detectify vs. Qualys
blog.detectify.com·2h
Archive Fixity
Automated Optimization of Peptide Identification Accuracy via Dynamic Mass Spectral Feature Weighting
dev.to·1d·
Discuss: DEV
🤖Grammar Induction
Biothreat hunters catch dangerous DNA before it gets made
nature.com·17h
🌸Bloom Variants