The Day I Hacked XCTrack
blog.syrac.orgยท8hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.toยท2hยท
Discuss: DEV
๐Ÿ”คCharacter Classification
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท8h
๐Ÿ”Vector Forensics
UNREDACTED Magazine Issue 009
inteltechniques.comยท57m
๐Ÿ“กRSS Readers
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.orgยท6hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Typography
Computer vision AI VTIโ€™s against Phishing
vmray.comยท2d
๐Ÿ‘๏ธPerceptual Hashing
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท12h
๐ŸšจIncident Response
Extract speaker notes from PowerPoint to text
dri.esยท1d
๐Ÿ“œPalimpsest Analysis
My old Infocom transcripts
blog.zarfhome.comยท1d
๐Ÿ•น๏ธRetro Gaming
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท10h
๐Ÿ›๏ธPREMIS Metadata
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.comยท1d
๐Ÿ”„Content Deduplication
The Death of the Curious Developer
hackernoon.comยท18h
๐ŸงญContent Discovery
An enough week
blog.mitrichev.chยท1dยท
๐Ÿ“ˆLinear programming
Parallels Desktop 26.1.1
tidbits.comยท50m
๐Ÿ” Terminal Fonts
Sorting encrypted data without decryption: a practical trick
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Hash Functions
Criminal Management Division Quarterly Goals
medium.comยท12h
๐Ÿ“ผCassette Hacking
WhatsApp Worm Targets Brazilian Banking Customers
news.sophos.comยท7h
๐Ÿ“กFeed Security
Malware found after scan
forums.anandtech.comยท2d
๐Ÿ”Binary Forensics