๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Binary Forensics

File Carving, Header Analysis, Evidence Recovery, Hex Archaeology

It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols
cacm.acm.orgยท19h
๐ŸŒNetworkProtocols
Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers
circleid.comยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
Fake Zoom Call Lures for Zoom Workplace Credentials
cofense.comยท1d
๐ŸŽซKerberos Attacks
How AI Revolutionized Performance Engineering: Hours to Minutes Analysis
engineering.salesforce.comยท1d
๐Ÿ‘๏ธSystem Observability
US Nuclear Weapons Agency 'Among 400 Organizations Breached By Chinese Hackers'
news.slashdot.orgยท17h
๐Ÿ”“Hacking
158-year-old company forced to close after ransomware attack precipitated by a single guessed password โ€” 700 jobs lost after hackers demand unpayable sum
tomshardware.comยท1dยท
Discuss: Hacker News, r/technews
๐Ÿ”“Hacking
Reversing a Fingerprint Reader Protocol (2021)
blog.th0m.asยท4dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Manage Multiple Amazon Vendor Central Accounts Safely, Prevent Suspension Risks
news.ycombinator.comยท52mยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Organizational Lobotomy
cacm.acm.orgยท1d
๐Ÿ”“Hacking
A Full Code Agent in 200 Lines
cthiriet.comยท2dยท
Discuss: Hacker News
โšกProof Automation
Exploring the context of online images with Backstory
deepmind.googleยท2dยท
Discuss: Hacker News
๐Ÿ“ฐContent Curation
Structural variation in 1,019 diverse humans based on long-read sequencing
nature.comยท18h
๐ŸงฌCopy Number Variants
Cross-domain Multi-step Thinking: Zero-shot Fine-grained Traffic Sign Recognition in the Wild
arxiv.orgยท6h
๐Ÿค–Advanced OCR
Now and Future of Artificial Intelligence-based Signet Ring Cell Diagnosis: A Survey
arxiv.orgยท1d
๐Ÿค–Advanced OCR
How I make teams productive
dev.toยท11hยท
Discuss: DEV, r/programming
๐Ÿ”ฉSystems Programming
Unlock Family Photo Secrets Using AI Questions
dev.toยท17hยท
Discuss: DEV
๐Ÿ“œFamily History Data
ReMeREC: Relation-aware and Multi-entity Referring Expression Comprehension
arxiv.orgยท6h
๐Ÿ“Concrete Syntax
Beyond Binary Rewards: Training LMs to Reason About Their Uncertainty
arxiv.orgยท1d
๐Ÿง Intelligence Compression
The Hacker's Edge: Why Mindset Beats Tools in Cybersecurity (Every Time)
dev.toยท7hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
NoHumansRequired: Autonomous High-Quality Image Editing Triplet Mining
arxiv.orgยท3d
๐Ÿค–Advanced OCR
Loading...Loading more...
AboutBlogChangelogRoadmap