Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
27771
posts in
23.8
ms
digital
forensics
—
torrent
file analysis for windows!
medium.com
·
3h
🔬
Archive Forensics
Seeking Advice on Crypto Recovery Through Digital
Asset
Forensics
news.ycombinator.com
·
2h
·
Discuss:
Hacker News
🔍
Digital Forensics
Show HN: Offline desktop tool that
extracts
media
endpoints
from raw HTML
z3r0dayzion-install.github.io
·
3h
·
Discuss:
Hacker News
🧪
Archive Fuzzing
Computer
Forensic
Tools
Comparison
2026
cybertriage.com
·
3d
🚨
Incident Response
Jailbreak Foundry: From Papers to
Runnable
Attacks for
Reproducible
Benchmarking
arxiv.org
·
1d
🧪
Binary Fuzzing
Embeddings Aren’t Magic: The Geometry of How
Vectors
Encode
Meaning
hackernoon.com
·
10h
🗂️
Vector Databases
Valuable
News
vermaden.wordpress.com
·
13h
🔌
Operating system internals
Jamf
Mobile
Forensics
: Advanced Mobile Security Updates
jamf.com
·
17h
🚨
Incident Response
How I run 4–8 parallel coding agents with
tmux
and
Markdown
specs
schipper.ai
·
15h
·
Discuss:
Hacker News
⚙️
Batch Processing
Week 09
thisweekin4n6.com
·
1d
🛣️
BGP Hijacking
Parse
, Don't
Guess
architecture-weekly.com
·
12h
✅
Format Verification
Stochastic
Kernel-Switching
Error Diffusion
blog.kaetemi.be
·
16h
🌊
Digital Signal Processing
A fake
FileZilla
site hosts a
malicious
download
malwarebytes.com
·
16h
🏺
ZIP Archaeology
A
stolen
Gemini API key
turned
a $180 bill into $82,000 in two days
techspot.com
·
9h
🎫
Kerberos Attacks
All in One: Unifying Deepfake Detection,
Tampering
Localization, and Source Tracing with a Robust Landmark-Identity
Watermark
arxiv.org
·
1d
🎵
Audio Hashing
Reverse engineering “
Hello
World” in
QuickBASIC
3.0
marnetto.net
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🎮
Switch Archaeology
The
Math
Behind the Match: Building Production Search for People
Names
hackernoon.com
·
9h
🌳
Trie Structures
Machine Learning Threat
Roundup
hiddenlayer.com
·
1d
🦠
Malware Analysis
Building a risk-based data
sanitization
strategy: When to use
Cryptographic
erasure vs. physical destruction
cybersecuritydive.com
·
20h
🛡️
Preservation Proofs
Claude code
underlap.org
·
1d
🔩
Systems Programming
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help