The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
OCR vs ADE: Mechanisms Behind the Methods
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„OCR
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท4h
๐Ÿ”Vector Forensics
Computer vision AI VTIโ€™s against Phishing
vmray.comยท2d
๐Ÿ‘๏ธPerceptual Hashing
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท8h
๐ŸšจIncident Response
Extract speaker notes from PowerPoint to text
dri.esยท1d
๐Ÿ“œPalimpsest Analysis
Sorting encrypted data without decryption: a practical trick
dev.toยท3hยท
Discuss: DEV
๐Ÿ”Hash Functions
An enough week
blog.mitrichev.chยท23hยท
๐Ÿ“ˆLinear programming
My old Infocom transcripts
blog.zarfhome.comยท20h
๐Ÿ•น๏ธRetro Gaming
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.comยท1d
๐Ÿ”„Content Deduplication
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
The Death of the Curious Developer
hackernoon.comยท13h
๐ŸงญContent Discovery
I Wrote an Imagemagick Field Guide for Myself, You Might Find It Useful
joeldare.comยท5hยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
Criminal Management Division Quarterly Goals
medium.comยท8h
๐Ÿ“ผCassette Hacking
WhatsApp Worm Targets Brazilian Banking Customers
news.sophos.comยท2h
๐Ÿ“กFeed Security
Malware found after scan
forums.anandtech.comยท1d
๐Ÿ”Binary Forensics
10 Command-Line Tools Every Data Scientist Should Know
kdnuggets.comยท2d
๐Ÿค–Archive Automation
Forensic Video Workflow with Amped FIVE โ€“ Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.comยท3d
โš–๏ธDigital Evidence