๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฟ DAT Forensics

Digital Audio Tape, Professional Recording, Time-based Media, Sony PCM

Digital Forensics Round-Up, August 20 2025
forensicfocus.comยท20h
๐Ÿ“ŸTerminal Forensics
Saleae Analyzer for the BDM protocol
zetier.comยท13h
๐Ÿ”ฌBinary Analysis
From Transcripts to Descriptions: Using Consumer AI Tools for Audio Collection Metadata
saaers.wordpress.comยท20h
๐Ÿ”„Archival Workflows
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgยท3hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Automated Anomaly Detection in Carboxylic Acid Polymer Degradation via Spectral Deconvolution and Bayesian Inference
dev.toยท3hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
From Discord Link to Malware Infection: Digital Forensics Walkthrough
infosecwriteups.comยท16h
๐Ÿฆ Malware Analysis
Reviving a Piece of Yesterdayโ€™s Tomorrow
hackaday.comยท1d
๐Ÿ—‚๏ธOptical Jukebox
Tech skills are cheap. Legal knowledge is priceless. Mindset is everything.
brettshavers.comยท17h
๐ŸŽฏThreat Hunting
CodeSOD: Copy of a Copy of a
thedailywtf.comยท1d
๐ŸŒฒB-tree Forensics
Erasing personal data from the devices you discard is a booming business
cnbc.comยท19hยท
Discuss: Hacker News
๐Ÿ”ฌHardware Forensics
Independent Component Analysis Demo
github.comยท1dยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
Building a better database to detect designer drugs
phys.orgยท1d
๐ŸงฒMagnetic Resonance
Show HN: SecretMemoryLocker โ€“ Q&A-Style Archive for Your Digital Life
secretmemorylocker.comยท7hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
AI Tools Now Use Radar to Wiretap Your Phone from 10 Feet Away
offthegridnews.comยท16hยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
Who invented the hard drive?
techspot.comยท2d
๐Ÿ—ƒ๏ธPunched Cards
Celebrating 10+ years of device intelligence & fraud prevention
fingerprint.comยท19h
๐Ÿ”—Binary Similarity
PB-IAD: Utilizing multimodal foundation models for semantic industrial anomaly detection in dynamic manufacturing environments
arxiv.orgยท8h
๐Ÿค–Advanced OCR
The government's spending review: Citizen data and digital identity projects need high security by default
techradar.comยท5h
๐Ÿ”—Data Provenance
Mindful Pomodoro on M5Stack Paper
hackster.ioยท16h
๐Ÿ–ฅ๏ธModern Terminals
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท2h
๐ŸŒDNS Security
Loading...Loading more...
AboutBlogChangelogRoadmap