🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Disk Forensics

MBR Analysis, File Carving, Timeline Reconstruction, Deleted File Recovery

From Discord Link to Malware Infection: Digital Forensics Walkthrough
infosecwriteups.com·2d
🦠Malware Analysis
Inheriting a hodgepodge of random old & slow drives. Need advice on the best way to manage them.
reddit.com·15h·
Discuss: r/homelab
💿Disk Geometry
Memento: A Survival Guide for Building Real Software with a Forgetful Genius
dev.to·1d·
Discuss: DEV
🧠Memory Forensics
Major raid targets counterfeit fake HDDs from Seagate, WD, and Toshiba in Malaysia, but is it too little too late?
techradar.com·1d
💿DAT Forensics
Forensic Focus Digest, August 22 2025
forensicfocus.com·15h
🔍Digital Forensics
Become a Partner of Dolphin Data Lab in Germany
dolphindatalab.com·16h
🔌Operating system internals
Get Back To WARP
binary.ninja·13h
🧪Binary Fuzzing
Building a Distributed Filesystem for Scalable Research
hudsonrivertrading.com·2d·
Discuss: Hacker News
🗄️File Systems
Ay MaMi - Analyzing a New macOS DNS Hijacker
objective-see.com·1d
🦠Malware Analysis
My A-Z toolbox: dcfldd
rubenerd.com·7h
📋DFDL
Saleae Analyzer for the BDM protocol
zetier.com·2d
🔬Binary Analysis
Hackaday Podcast Episode 334: Radioactive Shrimp Clocks, Funky Filaments, Owning the Hardware
hackaday.com·14h
🧪Cassette Hacks
Former developer jailed after deploying kill-switch malware at Ohio firm
securityaffairs.com·22h
🔓Hacking
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·14h·
Discuss: Hacker News
🔐Cryptographic Archaeology
Live and Let Die: Rethinking Personal Digital Archiving, Memory, and Forgetting Through a Library Lens
lil.law.harvard.edu·2d
🧲Magnetic Philosophy
Pasta Cooking Time
jefftk.com·17h
🧮Algorithmic Cooking
How do I delete old network drive connections?
forums.anandtech.com·6h
📟Vintage Protocols
Multi-perspective monitoring of wildlife and human activities from camera traps and drones with deep learning models
arxiv.org·1d
🤖Advanced OCR
How HackerOne Uses AI to Triage, Prioritize, and Validate Code Scanner Findings at Scale
hackerone.com·1d
⚡Proof Automation
[$] Bringing restartable sequences out of the niche
lwn.net·1d
🔩Systems Programming
Loading...Loading more...
AboutBlogChangelogRoadmap