Feeds to Scour
SubscribedAll
Scoured 9587 posts in 1.83 s
Digital Forensics: Registry Analysis for Beginners, Part 1 โ€“ Hives, Logs, and Acquisition โ€“ Hackers Arise
hackers-arise.comยท1d
๐Ÿ”NTLM Forensics
Preview
Report Post
Show HN: BrandRetina โ€“ screenshot similarity API for spear-phish detection
brandretina.aiยท1dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Preview
Report Post
Think Your Python Code Is Slow? Stop Guessing and Start Measuring
towardsdatascience.comยท1d
๐Ÿ‘๏ธSystem Observability
Preview
Report Post
Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data
cybersecuritynews.comยท8hยท
Discuss: Lobsters
๐Ÿง Memory Forensics
Preview
Report Post
Reversing engineering is a great way to find programming trainwrecks
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Preview
Report Post
Demystifying Fuzzer Behaviour (39c3)
cdn.media.ccc.deยท6h
๐Ÿ›Fuzzing
Preview
Report Post
Linux perf Examples
brendangregg.comยท12h
๐Ÿ“ŠPerformance Profiling
Preview
Report Post
AI Has Made it Easy to Own Your Tools
jimmyhmiller.github.ioยท23h
๐Ÿค–Archive Automation
Preview
Report Post
Treating Functions as Vectors in Hilbert Space
hackaday.comยท1d
๐Ÿ“Linear Algebra
Preview
Report Post
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.ioยท1d
๐Ÿ”Cryptographic Archaeology
Preview
Report Post
Running Code and Failing Models โ€“ Rajiv Shah
projects.rajivshah.comยท1d
๐Ÿง Machine Learning
Preview
Report Post
Cracking the Code: A Walkthrough of the Fam Product Security Challenge
infosecwriteups.com
ยท2d
๐ŸงชBinary Fuzzing
Preview
Report Post
<p>**Abstract:** The escalating sophistication of malware necessitates advanced detection techniques beyond signature-based or heuristic approaches. We introduc...
freederia.comยท3d
๐Ÿฆ Malware Analysis
Preview
Report Post
Show HN: AgentCmds โ€“ A directory of slash commands for AI agents
agentcmds.workยท10hยท
Discuss: Hacker News
โšกProof Automation
Preview
Report Post
NEWS ROUNDUP โ€“ 26th December 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Preview
Report Post
AIAuditTrack: A Framework for AI Security system
arxiv.orgยท2d
๐Ÿค–AI Curation
Preview
Report Post
The Little Book of Python Anti-Patterns โ€” Python Anti-Patterns documentation
docs.quantifiedcode.comยท1dยท
Discuss: Hacker News
โœ…Format Verification
Preview
Report Post
What Technologies Are Running Across 5.5M Websites (Nov 2025)
versiondb.ioยท14hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
Preview
Report Post
๐ŸŽฒ The Automatic Grover Algorithm
lucamarx.comยท1d
โš›๏ธQuantum Algorithms
Preview
Report Post
The power of box dimension attacks on the Epstein files
news.ycombinator.comยท11hยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler
Preview
Report Post