Feeds to Scour
SubscribedAll
Scoured 9564 posts in 641.9 ms
Digital Forensics: Registry Analysis for Beginners, Part 1 โ€“ Hives, Logs, and Acquisition โ€“ Hackers Arise
hackers-arise.comยท1d
๐Ÿ”NTLM Forensics
Preview
Report Post
Show HN: SQL Data Builder โ€“ Visual schema and query builder
vps-commander.comยท8hยท
Discuss: Hacker News
๐Ÿ’พDatabase Formats
Preview
Report Post
BankGPT TryHackMe Writeup Walkthrough
infosecwriteups.com
ยท19h
๐ŸบKerberos Archaeology
Preview
Report Post
Examining the IconCache database
thinkdfir.comยท34m
๐Ÿ”Binary Forensics
Preview
Report Post
Transaction Management: Making ACID Real
dev.toยท6hยท
Discuss: DEV
๐Ÿ“Database WAL
Preview
Report Post
Show HN: Reverse Engineering (Kind of) SQLite in Go
github.comยท1dยท
๐Ÿ”“Reverse engineering
Preview
Report Post
Hacking washing machines (39c3)
cdn.media.ccc.deยท1h
๐Ÿ“ผCassette Hacking
Preview
Report Post
What I Learned Building a Storage Engine That Outperforms RocksDB
tidesdb.comยท1hยท
๐Ÿฆ€Rusty Databases
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioยท8hยท
Discuss: DEV
๐Ÿ”Capability Systems
Preview
Report Post
Linux perf Examples
brendangregg.comยท15h
๐Ÿ“ŠPerformance Profiling
Preview
Report Post
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.toยท17hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Navigating the Labyrinth: Effective Database Indexing Strategies
dev.toยท2dยท
Discuss: DEV
๐Ÿ“‡Indexing Strategies
Preview
Report Post
How We Reduced a 1.5GB Database by 99%
cardogio.substack.comยท3dยท
๐Ÿฆ€Rusty Databases
Preview
Report Post
NEWS ROUNDUP โ€“ 24th December 2025
digitalforensicsmagazine.comยท3d
๐ŸšจIncident Response
Preview
Report Post
Advanced Database Concepts By Appin Technology
dev.toยท3dยท
Discuss: DEV
๐Ÿ’พSQLite
Preview
Report Post
Reason2Decide: Rationale-Driven Multi-Task Learning
arxiv.orgยท3d
โšกProof Automation
Preview
Report Post
Rethinking data in NL2SQL: a survey of what we have and what we expect | Vicinagearth
link.springer.comยท4d
๐Ÿ“‹Document Grammar
Preview
Report Post
What Is SOC Automation? A Practical Guide for Enterprises
vmray.comยท5d
โšกProof Automation
Preview
Report Post
<p>**Abstract:** The escalating sophistication of malware necessitates advanced detection techniques beyond signature-based or heuristic approaches. We introduc...
freederia.comยท3d
๐Ÿฆ Malware Analysis
Preview
Report Post
How Prompt Engineering Turned Natural Language into Production-Ready SQL Queries
dev.toยท4dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Internals
Preview
Report Post