Beginner’s guide to malware analysis and reverse engineering
intezer.com·13h
🦠Malware Analysis
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·9h
🔧Binary Parsers
Forensic journey: hunting evil within AmCache
securelist.com·1d
🔍Disk Forensics
Ghosts of Unix Past: a historical search for design patterns (2010)
lwn.net·5h·
🏠Homelab Archaeology
EditTrack: Detecting and Attributing AI-assisted Image Editing
arxiv.org·1d
🔍Vector Forensics
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.eu·1d
🔍NTLM Forensics
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.com·1h
👂Audio Evidence
Finding similar images with Rust and a Vector DB
ente.io·1d
🗂️Vector Databases
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·18h
🦠Malware Analysis
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.com·12h
🔗Binary Similarity
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·4d
💿FLAC Archaeology
Node.js Performance: Processing 14GB Files 78% Faster with Buffer Optimization
pmbanugo.me·1d·
Discuss: Hacker News
🌊Stream Processing
Spot trouble early with honeypots and Suricata
pentestpartners.com·23h
🛡️eBPF Security
Exploring Data Extraction from iOS Devices: What Data You Can Access and How
blog.digital-forensics.it·2d·
🍎Apple Archive
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·1d·
Discuss: Hacker News
🦠Malware Analysis
What Makes a Language Look Like Itself?
towardsdatascience.com·19h
🔤Character Classification
From the Browser to the Bloodstream
puri.sm·17h
🔗Data Provenance
Automated Optimization of Peptide Identification Accuracy via Dynamic Mass Spectral Feature Weighting
dev.to·1d·
Discuss: DEV
🤖Grammar Induction
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.com·11h
🌳Archive Merkle Trees
Biothreat hunters catch dangerous DNA before it gets made
nature.com·15h
🌸Bloom Variants