🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Format Forensics

File Carving, Header Analysis, Magic Numbers, Digital Evidence

Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset
arxiv.orgΒ·1d
πŸ”Vector Forensics
CRDT: Text Buffer by Evan Wallace
madebyevan.comΒ·9hΒ·
Discuss: Hacker News
πŸ”€CRDT
Benchmarking document information localization with Amazon Nova
aws.amazon.comΒ·11h
πŸ“„Document Digitization
Digital Forensics Jobs Round-Up, August 18 2025
forensicfocus.comΒ·1d
🚨Incident Response
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgΒ·1d
🏒Active Directory
Desync the Planet – Rsync Remote Code Execution
phrack.orgΒ·1dΒ·
Discuss: Lobsters
🌳Archive Merkle Trees
Risky Bulletin: NIST releases face-morphing detection guideline
news.risky.bizΒ·2h
πŸ”“Hacking
'RingReaper' Sneaks Right Past Linux EDRs
darkreading.comΒ·9h
πŸ“ŸTerminal Forensics
These scientists have a unique way of tackling video deepfakes - and all it takes is a burst of light
techradar.comΒ·2d
πŸ’ΏOptical Forensics
Trump's Justice Department is investigating whether DC police officials falsified crime data
the-independent.comΒ·10h
🚨Incident Response
Commercial Offensive Cyber Capabilities: Red-Team Focus and What It Means for Digital Investigations
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
Hidden in plain sight: How threat actors abuse SVGs for phishing
vmray.comΒ·16h
πŸ›‘οΈSecurity Headers
Finding links between fraudulent email domains using graph-based clustering
blog.castle.ioΒ·20hΒ·
Discuss: Hacker News
πŸ“‘DNS Archaeology
Analyzing evolution of the PipeMagic malware
securityaffairs.comΒ·21h
πŸ”“Hacking
Help Your Model Learn the True Signal
towardsdatascience.comΒ·1h
πŸ”Vector Forensics
RACF: Processing audit records
colinpaice.blogΒ·16h
πŸ€–Archive Automation
Hyperdimensional Semantic Mapping for Automated Historical Narrative Reconstruction
dev.toΒ·13hΒ·
Discuss: DEV
πŸ•ΈοΈHypertext Archaeology
What Exif Data Reveals About Your Site
brainbaking.comΒ·5d
πŸ–ΌοΈJPEG Forensics
Piciorgros TMO-100: Unauthorized log data access
seclists.orgΒ·1d
πŸ›‘οΈeBPF Security
Fuzzing Hardware Like Software (2021)
arxiv.orgΒ·9hΒ·
Discuss: Hacker News
πŸ§ͺHardware Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap