Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃攳 Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
181808
posts in
56.2
ms
calebevans/mulder
: An MCP server that gives AI agents access to forensic tools for digital investigations.
聽
馃寪
WARC Forensics
github.com
路
4d
路
Hacker News
One Tool to Rule Them All: File
Metadata
& Static Analysis for Malware Analysts and
SOC
Teams
聽
馃
Malware Analysis
infosecwriteups.com
路
2d
Forensic visibility gaps in
fileless
malware incidents: An empirical analysis of
artefact
survival rates across 49 confirmed intrusions
聽
馃
Malware Analysis
sciencedirect.com
路
10h
Building
Semantic
Version Control in Rust
聽
馃
Rust Macros
therohansharma.com
路
43m
路
Hacker News
Hexadecimal/Binary
Editor
聽
馃敩
Binary Analysis
crumblingstatue.github.io
路
6h
Analyzing the
RondoDox
Botnet
: A DDoS and Mining Threat
聽
馃
Malware Analysis
bitsight.com
路
2d
Stringology
Based
Cryptology
聽
馃攼
Cryptographic Archaeology
arxiv.org
路
4d
Fast multi-check tool for detection analysis
聽
馃捒
Optical Forensics
pixelscan.net
路
5d
CyberDefenders
聽
馃
Malware Analysis
medium.com
路
5d
Web
Application
Forensics
聽
馃彚
LDAP Forensics
medium.com
路
6d
Data Heist
Scenerio
:
HackViser
聽
馃敁
Hacking
medium.com
路
3d
cychronex-labs/Exlex
: Zero-copy, Performance-first,no_std, DOD-based, Arena based Mutation Parser
聽
馃
Rust Macros
github.com
路
3h
路
r/rust_gamedev
Comparative
Analysis of
AES
Algorithm Implementation on Digital Message and Text File Security
聽
馃攼
Archive Cryptanalysis
medium.com
路
4d
TLSCheck
2.0: An Enhanced Memory Forensics Approach to Efficiently Detect TLS
Callbacks
聽
馃
Memory Forensics
arxiv.org
路
2d
The Cost of Understanding: LLM-Driven Reverse Engineering vs
Iterative
LLM
Obfuscation
聽
馃М
Z3 Solver
elastic.co
路
4d
Investigation: Image Analysis and
Location
Identification
聽
馃敩
Archive Forensics
medium.com
路
3d
Towards Certified Malware Detection:
Provable
Guarantees Against
Evasion
Attacks
聽
馃И
Binary Fuzzing
arxiv.org
路
2d
PicoCTF
Writeup
聽
馃И
Binary Fuzzing
infosecwriteups.com
路
6d
Adaptive
Forensic
Feature Refinement via
Intrinsic
Importance Perception
聽
馃搳
Learned Metrics
arxiv.org
路
4d
EvoPatch-IoT
: Evolution-Aware Cross-Architecture Vulnerability Retrieval and Patch-State Profiling for
BusyBox-Based
IoT Firmware
聽
馃И
Binary Fuzzing
arxiv.org
路
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help