Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24069
posts in
14.8
ms
Bit-Vector
CHC
Solving for
Binary
Analysis and
Binary
Analysis for Bit-Vector
CHC
Solving
🔢
Bitwise Algorithms
arxiv.org
·
2d
·
…
On the classification of
questioned
PDF documents —
Attributing
PDF documents to the tools that created them
📄
PDF Archaeology
sciencedirect.com
·
4h
·
…
Linux
Forensic
Scenario
📟
Terminal Forensics
righteousit.com
·
6d
·
…
Basic
Pentesting
0x01
🧪
Binary Fuzzing
infosecwriteups.com
·
12h
·
…
Container Transforms: Working with
Nested
Binary
Formats
🔧
Binary Parsing
binary.ninja
·
2d
·
…
Stop Writing
If-Chains
: 8 Python Pattern Matching
Examples
for Data Science
🔍
RegEx Engines
captain-solaris.medium.com
·
5d
·
…
Digital
Forensics
Round-Up, April 01 2026
🚨
Incident Response
forensicfocus.com
·
1d
·
…
your
hex
editor should color-code
bytes
📜
Binary Philology
simonomi.dev
·
2d
·
Lobsters
,
Hacker News
·
…
When
Verified
Source
Lies
🌳
Archive Merkle Trees
hackernoon.com
·
6d
·
…
Breaking
Enigma
with Index of
Coincidence
on a Commodore 64
🔐
Cryptographic Archaeology
imapenguin.com
·
2d
·
Hacker News
,
r/crypto
,
r/programming
·
…
Reverse Engineering
Crazy
Taxi
, Part 2
🎮
Game Decompilation
wretched.computer
·
3d
·
Hacker News
·
…
EtherHiding
: The Trojan in Your
Toolchain
🌳
Archive Merkle Trees
cyber.gc.ca
·
2d
·
Hacker News
·
…
Random
File
Format
📦
Deflate
shkspr.mobi
·
1d
·
Hacker News
·
…
Bigoish
: Test the
empirical
computational complexity of Rust algorithms
🦀
Rust Macros
docs.rs
·
6d
·
Lobsters
,
Hacker News
·
…
philipl/inferencefs
: The new data-free filesystem!
🏺
ZIP Archaeology
github.com
·
1d
·
Hacker News
·
…
What we found reading all
512K
lines of Claude Code's
leaked
source
🎮
Game Decompilation
clawdecode.net
·
1d
·
Hacker News
·
…
ttarvis/dataprint
: Fingerprinting and similarity for large JSONL files.
🔗
Binary Similarity
github.com
·
3d
·
Hacker News
·
…
CIPHER:
Counterfeit
Image Pattern High-level
Examination
via Representation
🖼️
JPEG Forensics
arxiv.org
·
1d
·
…
Label-efficient
Training Updates for
Malware
Detection over Time
🔗
Binary Similarity
arxiv.org
·
2d
·
…
Breaking
Enigma
with Index of
Coincidence
on a Commodore 64
🔐
Cryptographic Archaeology
imapenguin.com
·
2d
·
Hacker News
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help