๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Format Recovery

File Carving, Structure Reconstruction, Legacy Formats, Digital Archaeology

Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comยท11hยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comยท8h
๐Ÿ“Concrete Syntax
Reconstructing Tornadoes in 3D with Gaussian Splatting
arxiv.orgยท1d
๐ŸบComputational Archaeology
Connect Claude AI with Obsidian: A Game-Changer for Knowledge Management ๐Ÿš€
dev.toยท19hยท
Discuss: DEV
๐Ÿค–Archive Automation
Kumo Surfaces Structured Data Patterns Generative AI Misses
thenewstack.ioยท20m
๐Ÿ“ŠGraph Databases
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท1d
๐Ÿฆ Malware Analysis
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท6h
๐Ÿ”NTLM Forensics
27-year-old Easter egg found in the Apple Power Mac G3's ROMโ€” creating a RAM disk with the name 'secret ROM image' unveils a hidden file
tomshardware.comยท3h
๐Ÿ–ฅ๏ธVintage Macintosh
Google Cache Is Gone, I Like This Way Better: How to View Archived Websites
pcmag.comยท1hยท
Discuss: Hacker News
๐ŸŒWeb Archiving
Building Digital Preservation Skills Using the DPCโ€™s Novice to Know-How (N2KH) Courses
saaers.wordpress.comยท1d
๐Ÿ”„Archival Workflows
iPRES Digital Preservation Bake Off 2025 - Amuse Bouche Challenge: Tiny Tools, Tasty Wins
ipres2025.nzยท2d
๐Ÿ”„Archival Workflows
Barcode Tool - Generator & Scanner
ricardodeazambuja.comยท5h
๐Ÿ“ฑQR Archaeology
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comยท17h
๐Ÿ”„Burrows-Wheeler
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgยท17hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWebP Analysis
Program Execution, follow-up
windowsir.blogspot.comยท2hยท
Discuss: www.blogger.com
โšกPerformance Tools
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท2h
๐Ÿฆ Malware Analysis
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chยท5h
๐Ÿ—ƒ๏ธDatabase Storage
Normality Prior Guided Multi-Semantic Fusion Network for Unsupervised Image Anomaly Detection
arxiv.orgยท1d
๐Ÿ‘๏ธPerceptual Hashing
Capturing my handwriting in a searchable digital format โ€“ the long way round
colinramsay.co.ukยท1dยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
Networking for Systems Administrators
mwl.ioยท1hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Loading...Loading more...
AboutBlogChangelogRoadmap