Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28459
posts in
17.8
ms
๐งช Digital
Forensics
Writeup
โ Metadata, Corruption & Macro Analysis
medium.com
ยท
16h
๐
Format Forensics
digital
forensics
โ
torrent
file analysis for windows!
medium.com
ยท
2d
๐ฌ
Archive Forensics
Seeking Advice on Crypto Recovery Through Digital
Asset
Forensics
news.ycombinator.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Digital Forensics
Faster C software with
Dynamic
Feature Detection
gist.github.com
ยท
14h
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
โก
SIMD Vectorization
Digital
Forensics
Round-Up, March 04 2026
forensicfocus.com
ยท
15h
โ๏ธ
Digital Evidence
From phishing to Google Drive
C2
: Silver Dragon expands
APT41
playbook
securityaffairs.com
ยท
20h
๐บ
Kerberos Archaeology
Islands
of
Invariance
rastamouse.me
ยท
9h
๐
Compiler Optimizations
tayler-id/mcphound
: The most comprehensive MCP security scanner โ attack paths, tool poisoning,
typosquats
, CVEs, trust scores, rug-pull detection
github.com
ยท
5h
ยท
Discuss:
Hacker News
๐ณ
Archive Merkle Trees
The Family Laptop Trap:
Unmasking
a Go-Based
Crypto-Heist
infosecwriteups.com
ยท
2d
๐
Hacking
DOCFORGE-BENCH
: A Comprehensive Benchmark for Document
Forgery
Detection and Analysis
arxiv.org
ยท
2d
๐ง
Manuscript Watermarks
SOC
Software: Tools Your Team Needs in 2026
cybertriage.com
ยท
7h
๐จ
Incident Response
DInvestigating
Windows File System
Artifacts
Under C:\Windows
blog.elcomsoft.com
ยท
1d
๐
NTLM Archaeology
CodeSOD
:
Repeating
Your Existence
thedailywtf.com
ยท
1d
๐
Shell Calculus
Analyzing Runtime
Linking
|
Strings
& Imports
malware.news
ยท
15h
๐
Static Linking
Investigating the "Bus Factor" Risk in
MongoDB
,
MariaDB
, and More
hackernoon.com
ยท
1d
๐งฌ
PostgreSQL Forensics
Back to
Basics
: Hacking on Key
Matrixes
hackaday.com
ยท
1d
โก
Circuit Archaeology
As Bad
Atime
as Any: Every Read a
Write
ben.enterprises
ยท
9h
ยท
Discuss:
Hacker News
โ
Archive Fixity
Addressing a type system
limitation
with
syntactic
sugar
futhark-lang.org
ยท
1d
๐ง
Liquid Types
Differentiating
Between a Targeted Intrusion and an Automated
Opportunistic
Scanning [Guest Diary], (Wed, Mar 4th)
isc.sans.edu
ยท
5h
๐ฏ
Threat Hunting
Hooked on Linux:
Rootkit
Taxonomy, Hooking Techniques and
Tradecraft
elastic.co
ยท
1d
๐
eBPF
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help