Feeds to Scour
SubscribedAll
Scoured 15815 posts in 131.0 ms
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·16h
📊Static Analysis
Preview
Report Post
Dissecting Digital Viruses: My First Steps in Malware Analysis
dev.to·1d·
Discuss: DEV
🦠Malware Analysis
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.io·1d
🔬Binary Analysis
Preview
Report Post
Mathematical and computational perspectives on the Boolean and binary rank and their relation to the real rank
arxiv.org·23h
🔢Binary Embeddings
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.com·15h·
Discuss: Hacker News
🌐WARC Forensics
Preview
Report Post
CodeSOD: Well Timed Double Checking
thedailywtf.com·1d
🧪Binary Fuzzing
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.com·13h
🧪Archive Fuzzing
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·11h
🔍Audio Forensics
Preview
Report Post
How to find things (an intro to binary search)
drmaciver.substack.com·2d·
Discuss: Substack
🌳Trie Structures
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·14h
🕵️Penetration Testing
Preview
Report Post
#1 - Spot Problems Before Reading Any Code
dev.to·7h·
Discuss: DEV
Format Verification
Preview
Report Post
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
securityaffairs.com·1d
🦠Malware Analysis
Preview
Report Post
Don't use cosine similarity carelessly
p.migdal.pl·1d
📐Vector Similarity
Preview
Report Post
Enhanced Cyber Threat Intelligence by Network Forensic Analysis for Ransomware as a Service(RaaS) Malwares
arxiv.org·23h
🦠Malware Analysis
Preview
Report Post
Dealing with alternatives
jemarch.net·1d
🔧Binary Parsing
Preview
Report Post
Use Babel to Deobfuscate JavaScript Malware
blag.nullteilerfrei.de·3d
🎯Gradual Typing
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·14h
🛡Cybersecurity
Preview
Report Post
The 2026 String Similarity Guidelines: Automating the Mistakes of the Past
circleid.com·1d
Format Verification
Preview
Report Post
Tools I use
prepend.com·1d
🔌Operating system internals
Preview
Report Post
Threat Actors Expand Abuse of Microsoft Visual Studio Code
jamf.com·1d·
Discuss: Hacker News
🔓Hacking
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help