🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Binary Forensics

File Carving, Header Analysis, Evidence Recovery, Hex Archaeology

Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.com·4d
🧬Bitstream Evolution
cargo-auditable v0.7 is out with native SBOM support
reddit.com·2d·
Discuss: r/rust
⚡Dependent Rust
The Power and Potential of Zero-Knowledge Proofs
cacm.acm.org·1d·
Discuss: Hacker News
🔐Quantum Security
This Should Not Be Possible
ghuntley.com·11h·
Discuss: Hacker News
🛡️eBPF Security
Matt Dillon discusses the past, present and future of BSDs (2022)
web.archive.org·17h·
Discuss: Hacker News
🔓Open Source Software
Intermediate Zig Build
rdunnington.github.io·1d·
Discuss: Hacker News
⚙️Build Archaeology
De novo assembly&delivery of synthetic megabase-scale human DNA to mouse embryos
nature.com·12h·
Discuss: Hacker News
🧬Copy Number Variants
Google finds custom backdoor being installed on SonicWall network devices
arstechnica.com·2d·
Discuss: Hacker News
🔓Hacking
Show HN: Tips for getting great Text2Cypher outputs from LLMs for Graph RAG
blog.kuzudb.com·23h·
Discuss: Hacker News
🕸️Neo4j
Ask HN: Thoughts on combining static analysis and AI for system understanding?
news.ycombinator.com·22h·
Discuss: Hacker News
⚙️Build Archaeology
When Pattern-by-Pattern Works: Theoretical and Empirical Insights for Logistic Models with Missing Values
arxiv.org·1d
🧮Kolmogorov Complexity
Developer loses $500k via malicious Cursor Extension
kaspersky.com·3d·
Discuss: Hacker News
🚀Indie Hacking
Hiding messages in a deck playing cards
asherfalcon.com·22h·
Discuss: Hacker News
🦠Parasitic Storage
How TPMs Work and Why We Added Support in Bottlerocket
molnett.com·1d·
Discuss: Hacker News, r/linux
🔒Hardware Attestation
ECS Survivors Part VI: Code Refactor
blog.ptidej.net·2h·
Discuss: Hacker News
🦀Rust Borrowing
I Tested 5 CLI Coding Agents & Here’s What Surprised Me!
dev.to·2h·
Discuss: DEV
⚡Proof Automation
Show HN: SilentArena – Learn ransomware behavior safely (C-based)
github.com·2d·
Discuss: Hacker News
🦠Malware Analysis
The Big OOPs: Anatomy of a Thirty-Five Year Mistake
computerenhance.com·1d·
Discuss: Hacker News, Hacker News
🏗️Compiler Archaeology
Topology Meets Machine Learning
ams.org·1d·
Discuss: Hacker News
🧠Machine Learning
Python Fundamentals: cassandra-driver
dev.to·1d·
Discuss: DEV
🔀CRDT
Loading...Loading more...
AboutBlogChangelogRoadmap