๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Binary Forensics

File Carving, Header Analysis, Evidence Recovery, Hex Archaeology

The Inner JSON Effect - The Daily WTF
thedailywtf.comยท3h
๐Ÿš€Indie Hacking
Wing FTP Server flaw actively exploited shortly after technical details were made public
securityaffairs.comยท3h
๐Ÿ”“Hacking
Help validate a new open-source prototyping platform!
reddit.comยท12hยท
Discuss: r/homelab
๐ŸŽฎSwitch Archaeology
Archaeology 1.3
mjtsai.comยท4d
๐ŸบZIP Archaeology
I built a vector-value database in pure C: libvictor + victordb (daemon) โ€” AMA / Feedback welcome
github.comยท2dยท
Discuss: r/programming
๐Ÿ—‚๏ธVector Databases
Ilion Framework: A Public Layer for Semantic Alignment with Truth
zenodo.orgยท10hยท
Discuss: Hacker News
๐Ÿ’พBinary Linguistics
Last Week on My Mac: Ghosts in the machine
eclecticlight.coยท12h
๐ŸŽApple Archive
Towards a secret history of Voynichese gallowsโ€ฆ
ciphermysteries.comยท1d
๐Ÿ”Cryptographic Archaeology
BSDCan 2025 Trip Report by Mark Johnston
discoverbsd.comยท6h
๐Ÿ”ŒOperating system internals
Full-Stack DIY Smart Home: ESP8266/STM32, MQTT & WebSockets
hackster.ioยท20h
๐Ÿ Home Automation
A Harris Matrix Generator & Natural Language Query Tool
electricarchaeology.caยท2d
๐Ÿค–Paleographic ML
Criminals are using a dangerous fake free VPN to spread malware via GitHub - here's how to stay safe
techradar.comยท13h
๐Ÿ”“Hacking
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
sentinelone.comยท3d
๐Ÿฆ Malware Analysis
sca-fuzzer: Revizor - a fuzzer to search for microarchitectural leaks in CPUs
github.comยท20hยท
Discuss: Lobsters, Hacker News
๐ŸŽฎSwitch Archaeology
Coming Out of Retirement for This One: On AI, Authorship, and the Erosion of Ground Truth
forensicphotoshop.blogspot.comยท1dยท
Discuss: www.blogger.com
๐Ÿ‘‚Audio Evidence
Digital Forensics Round-Up, July 09 2025
forensicfocus.comยท4d
๐Ÿ”Audio Forensics
Show HN: A Scarce Cryptoasset Rooted in Private ETH Destruction
worm.cxยท7hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Code highlighting with Cursor AI for $500,000
securelist.comยท3d
๐Ÿš€Indie Hacking
.NET: From Zero to Hero
dotnetz2h.comยท8hยท
Discuss: Hacker News
๐ŸšNordic Shell
Dealing With The Thing At Point
irreal.orgยท3h
๐Ÿ”—Concatenative Programming
Loading...Loading more...
AboutBlogChangelogRoadmap