🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💾 Disk Utilities

dd Command, Imaging Tools, Forensic Recovery, Bit-level Access

Digital Forensics Round-Up, August 06 2025
forensicfocus.com·22h
🔐Archive Cryptanalysis
Opportunity to work with the kernel filesystem, as the maintainer calls for assistance. EXT4 BUG converted to feature
lore.kernel.org·16h·
Discuss: r/linux
🔌Operating system internals
Floppy Disks, Forgotten Systems and Fragile Knowledge: Insights from the Retro Computing Community
digitalpreservation-blog.lib.cam.ac.uk·4h
💿Floppy Forensics
DMP ownership, data retention and PIDs
dcc.ac.uk·5h
🔗Data Provenance
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·1d
🛡️eBPF Security
Need OS/software suggestions please!
i.imgur.com·20m·
Discuss: r/homelab
🔌Operating system internals
Crypto Recovery Specialist – Blockchain Investigator – Helping Victims Reclaim
news.ycombinator.com·16h·
Discuss: Hacker News
⛏️File Carving
(Not) Strange Bedfellows – Samsung’s Rubin & Digital Wellbeing
thebinaryhick.blog·15h
🔒Secure Boot
SimpSave: Minimalistic and Immediate Python Data Persistence for Student Projects and Lightweight Scripts
dev.to·52m·
Discuss: DEV
📦Deflate
Show HN: Sinkzone DNS forwarder that blocks everything except your allowlist
github.com·21h·
Discuss: Hacker News
🌐DNS Security
Reverse-Engineering Game Boy Advance Games (and General Advice)
nytpu.com·1d
🎮Game Decompilation
ARCNET: The Sleeping Giant (gitpi.us)
gitpi.us·13h
📼Cassette Networks
VulnOS “Legacy” Lab Walkthrough
infosecwriteups.com·9h
🏠Homelab Pentesting
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.com·23h
🛡Cybersecurity
When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory
unit42.paloaltonetworks.com·1d
🎯NTLM Attacks
This No-Subscription Security Cam Is at Its Lowest Price Right Now
lifehacker.com·1h
📼Cassette Hacking
Divine Comedy
thedailywtf.com·7h
🔗Concatenative Programming
Jenny’s Daily Drivers: FreeDOS 1.4
hackaday.com·21h
🕹️Retro Gaming
How Can Math Protect Our Data?
quantamagazine.org·17m
⚛️Quantum Error Correction
External Network Penetration Testing and Best Practices
hackerone.com·21h
🕵️Penetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap