Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Format Forensics
File Carving, Header Analysis, Magic Numbers, Digital Evidence
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19442
posts in
484.0
ms
A case study in PDF
forensics
: The Epstein
PDFs
pdfa.org
·
3d
·
Discuss:
Hacker News
📄
PDF Forensics
Examining
black-box forensic tools in digital vehicle
forensics
: Capabilities, limitations, and practical implications
sciencedirect.com
·
4d
🔬
Hardware Forensics
Precise Text and
Tabular
Data Extraction from
PDFs
in Python
dev.to
·
1d
·
Discuss:
DEV
📋
Document Layout
Copyright Detective: A Forensic System to Evidence LLMs
Flickering
Copyright
Leakage
Risks
arxiv.org
·
1d
🗜️
ZIP Forensics
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
1d
🎯
Performance Forensics
Codex-Crusader/Image-Protector
: A small Python tool to
obfuscate
images against automated scraping and basic ML analysis.
github.com
·
1d
·
Discuss:
Hacker News
📸
PNG Optimization
First Steps,
Lasting
Impact: Platform-Aware
Forensics
for the Next Generation of Analysts
arxiv.org
·
4d
🧬
PostgreSQL Forensics
💀 Modern
Malware
’s
Anti-Forensics
dev.to
·
1d
·
Discuss:
DEV
🧠
Memory Forensics
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
1d
🚨
Incident Response
ASCII
art,
visually
explained
flowingdata.com
·
2d
🔤
Font Archaeology
learning by
reverse
engineering
clymup.com
·
3h
🔓
Reverse engineering
Show HN: The
Librarian
creates artifacts while a model
finishes
its work
librarian.fieldtheory.dev
·
21h
·
Discuss:
Hacker News
📄
Document Digitization
https://www.cl.cam.ac.uk/~
mgk25/ucs/examples/UTF-8-test.txt
cl.cam.ac.uk
·
2h
🔤
Character Encoding
How
Associa
transforms document classification with the GenAI
IDP
Accelerator and Amazon Bedrock
aws.amazon.com
·
1d
📋
Document Analysis
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
2d
🎫
Kerberos Exploitation
Going Through
Snowden
Documents
, Part 5
libroot.org
·
10h
·
Discuss:
Hacker News
💧
Manuscript Watermarks
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
1d
🦠
Malware Analysis
**Abstract:** This paper introduces Hyperdimensional Semantic Alignment for Ancient Text Restoration and
Contextualization
(
HASATRC
), a novel framework lever...
freederia.com
·
2d
📜
Palimpsest Analysis
How Forensic
Photonics
verifies
digital evidence with Content Credentials
contentauthenticity.org
·
3d
·
Discuss:
Hacker News
💿
Optical Forensics
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help