🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🗃️ Database Forensics

SQL Investigation, Transaction Analysis, Recovery Techniques, Evidence Extraction

Radicle Collaborative Objects
radicle.xyz·2d
📦Content Addressing
Fascinating Discoveries are Waiting Just Below the Surface: A Journey into Geocoding with Sabrina Templeton
blogs.loc.gov·2d
📚MARC Records
Family sues after funeral home sends son’s brain in unmarked leaking box
theguardian.com·9h
🧠Memory Forensics
Blacksuit ransomware: Law enforcement officials seize ransomware website
heise.de·21h
🎫Kerberos Exploitation
TreeView - A Go module for building, navigating, and displaying hierarchical data in the terminal.
github.com·1d·
Discuss: r/golang
🌳Incremental Parsing
Oso Focuses on Fine-Grained Authorization To Thwart AI Risks
thenewstack.io·1d
🔒WASM Capabilities
DNA reveals identity of man whose body was found more than three decades ago in Missouri
the-independent.com·1d
👪Geneology
My boss used AI for 2 hours to solve a problem I fixed in 10 minutes
reddit.com·1d·
Discuss: r/artificial
⚡Proof Automation
USB-C-ing All The Things
hackaday.com·3d·
Discuss: Hacker News
💾Floppy Imaging
Breaking: How the New 911 Technology Tracks You Instantly to Save Lives Faster
dev.to·1d·
Discuss: DEV
🚨Incident Response
LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models
arxiv.org·1d
💻Local LLMs
RAG Systems Are Breaking the Barriers of Language Models: Here's How
hackernoon.com·2d
💻Local LLMs
Prompt Injection Attacks: Hacking AI Through Conversation
infosecwriteups.com·1d
⚡Proof Automation
Beyond “Better Together”: Maximize your Microsoft 365 security with Sophos MDR
news.sophos.com·2d
🏺Kerberos Archaeology
Quantifying the ROI of Cyber Threat Intelligence: A Data-Driven Approach
arxiv.org·2d
🧠Intelligence Compression
Coyote malware is first-ever malware abusing Windows UI Automation
securityaffairs.com·1d
🦠Malware Analysis
GhostUMAP2: Measuring and Analyzing (r,d)-Stability of UMAP
arxiv.org·2d
🌀Differential Geometry
Expense Coding Errors Aren’t Random—They’re Rule-Based, New Study Finds
hackernoon.com·3d
✅Format Verification
MuseAir hashing algorithm v0.4 released (currently Rust only)
github.com·1d·
Discuss: Hacker News
🔍MinHash Variants
AI and Data Privacy: What Developers Need to Know About Governance
dev.to·17h·
Discuss: DEV
🔄Archival Workflows
Loading...Loading more...
AboutBlogChangelogRoadmap