๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Binary Forensics

File Carving, Header Analysis, Evidence Recovery, Hex Archaeology

New Community of Practice for Exploring Content Provenance and Authenticity in the Age of AI
blogs.loc.govยท4d
๐Ÿ“šMARC Archaeology
tmux and gist and trying to make students happier
jpmens.netยท2d
๐Ÿ“บTerminal UI
Pluralistic: How my DRM-free principles left me owning the rights to a German audiobook (21 Jul 2025)
pluralistic.netยท20h
๐Ÿ”BitFunnel
Piramidal (YC W24) Is Hiring a Full Stack Engineer
ycombinator.comยท2dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
A curated directory for developers to discover and showcase tech products
devhub.bestยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Managing EFI Boot Loaders for Linux: Controlling Secure Boot
rodsbooks.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Secure Boot
No, Your chatbot can't be hacked via DNS (at least not on its own)
domainsure.comยท16hยท
Discuss: Hacker News
๐ŸŒDNS Security
Weekly Challenge: Clearly the Title
dev.toยท1dยท
Discuss: DEV
๐ŸŒณIncremental Parsing
Linkdump No 64
82mhz.netยท4d
๐Ÿ”ŒOperating system internals
Homework Help via Photo Analysis AI
dev.toยท10hยท
Discuss: DEV
๐Ÿค–AI Paleography
๐Ÿ” Understanding Supervised Learning: A Guide for Beginners
dev.toยท18hยท
Discuss: DEV
๐Ÿง Machine Learning
Machine Learning Fundamentals: ensemble learning example
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStream Processing
Paired Image Generation with Diffusion-Guided Diffusion Models
arxiv.orgยท5h
๐Ÿง Machine Learning
Extracting Visual Facts from Intermediate Layers for Mitigating Hallucinations in Multimodal Large Language Models
arxiv.orgยท5h
๐Ÿง Neural Compression
Gene-DML: Dual-Pathway Multi-Level Discrimination for Gene Expression Prediction from Histopathology Images
arxiv.orgยท5h
๐Ÿ—‚๏ธVector Databases
Automated Vigilance State Classification in Rodents Using Machine Learning and Feature Engineering
arxiv.orgยท5h
๐Ÿง Machine Learning
The Good, the Bad and the Ugly in Cybersecurity โ€“ Week 29
sentinelone.comยท3d
๐Ÿ”“Hacking
Azoth: Objective-C UI library for SDL3
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“บTerminal UI
RefCritic: Training Long Chain-of-Thought Critic Models with Refinement Feedback
arxiv.orgยท5h
โœจEffect Handlers
Advanced PDF Optimization Techniques - 1752979
dev.toยท2dยท
Discuss: DEV
๐Ÿ“ฆDeflate
Loading...Loading more...
AboutBlogChangelogRoadmap