๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Binary Forensics

File Carving, Header Analysis, Evidence Recovery, Hex Archaeology

The Hidden World of Coordinates
youtube.comยท1d
๐Ÿ•ธ๏ธAlgebraic Topology
Anatomy of a Hack: How a Simple Logic Flaw Led to a $285k Exploit on Zoth
blog.verichains.ioยท2d
๐ŸŽซKerberos Attacks
TIL the Netherlands Forensic Institute can detect deepfake videos by analyzing subtle changes in the facial color caused by a personโ€™s heartbeat, which is somet...
dutchnews.nlยท2dยท
Discuss: Hacker News, r/todayilearned
๐ŸŽž๏ธMKV Forensics
FileMock - Client-side mock file generator
filemock.comยท2dยท
Discuss: Hacker News, r/InternetIsBeautiful, r/devops, r/reactjs
๐ŸบZIP Archaeology
Two Birds with One Tone: I/Q Signals and Fourier Transform
wirelesspi.comยท1dยท
Discuss: Hacker News
๐Ÿ“กFrequency Archaeology
This is your sign to step away from the keyboard
blog.talosintelligence.comยท2dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
The Economics of Hosting Open Source Models
inference.netยท15mยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Micron rolls out 276-layer SSD trio for speed, scale, and stability
blocksandfiles.comยท10hยท
Discuss: Hacker News
๐Ÿ’ฝMiniDisc Technology
The Convenience Trap: Why Seamless Banking Access Can Turn 2FA into 1FA
blog.opencore.chยท2dยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
Linux Fu: The Cheap Macropad Conundrum
hackaday.comยท10h
โŒจ๏ธMechanical Keyboards
How the FBI got everything it wanted (re-air) (Lock and Code S06E15)
malwarebytes.comยท1d
๐Ÿ•ณ๏ธInformation Leakage
Reducing Data Requirements for Sequence-Property Prediction in Copolymer Compatibilizers via Deep Neural Network Tuning
arxiv.orgยท20h
๐ŸงฎKolmogorov Complexity
Mastering Nmap: The Ultimate Guide to Port Scanning
infosecwriteups.comยท1d
๐Ÿ•ต๏ธDomain Enumeration
A Rational Survival Guide to Vibe Coding with AI
blog.anantshri.infoยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Hierarchical mixtures of Gaussians for combined dimensionality reduction and clustering
arxiv.orgยท20h
๐ŸŒŠSpectral Clustering
Context-protector: security wrapper for MCP servers
github.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Singularity Cipher: A Topology-Driven Cryptographic Scheme Based on Visual Paradox and Klein Bottle Illusions
arxiv.orgยท20h
๐Ÿ”Quantum Security
An LLM Driven Agent Framework for Automated Infrared Spectral Multi Task Reasoning
arxiv.orgยท20h
๐ŸŒˆSpectroscopy
Show HN: SQLite-vector โ€“ Vector search extension for SQLite (no index, 30MB RAM)
github.comยท2dยท
Discuss: Hacker News
๐Ÿ’พSQLite
Deep-Dive Reports on Leading Topics in AI and Digital Modernity
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap