🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Format Forensics

File Carving, Header Analysis, Magic Numbers, Digital Evidence

Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toΒ·7hΒ·
Discuss: DEV
⛏️Archive Mining
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.comΒ·5h
🦠Malware Analysis
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·8h
πŸ“Concrete Syntax
The Inefficiency in Digital Forensics
cyb3rops.medium.comΒ·2d
🚨Incident Response
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comΒ·11hΒ·
Discuss: Hacker News
πŸ“²Digitization
Normality Prior Guided Multi-Semantic Fusion Network for Unsupervised Image Anomaly Detection
arxiv.orgΒ·1d
πŸ‘οΈPerceptual Hashing
Barcode Tool - Generator & Scanner
ricardodeazambuja.comΒ·5h
πŸ“±QR Archaeology
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
Program Execution, follow-up
windowsir.blogspot.comΒ·1hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comΒ·23h
πŸ”¬Archive Forensics
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·1d
πŸ”“Password Cracking
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·17h
πŸ”—Data Provenance
Historic paintings are being reborn with MIT's AI-based restoration method
techspot.comΒ·1dΒ·
Discuss: r/technews
πŸ“„Document Digitization
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·4h
🎯Threat Hunting
Week 25 – 2025
thisweekin4n6.comΒ·3d
🌐WARC Forensics
FileFix – A ClickFix Alternative
mrd0x.comΒ·1dΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
The modern text processing pipeline: Overview
newroadoldway.comΒ·1dΒ·
Discuss: Lobsters, r/programming
πŸ”€Unicode Normalization
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·5h
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap