Feeds to Scour
SubscribedAll
Scoured 11468 posts in 851.6 ms
Tools for detecting AI generated content
nikitanamjoshi.substack.comยท9hยท
Discuss: Substack
๐Ÿ’งManuscript Watermarks
Preview
Report Post
Windows Exploitation Techniques: Winning Race Conditions with Path Lookups
projectzero.googleยท19h
๐ŸงชBinary Fuzzing
Preview
Report Post
Used AI to Turn an Intel Analysis Book Into a System That Uncovers Overlooked Information from the Epstein Files
reddit.comยท2dยท
Discuss: r/artificial
๐Ÿ“ŸTerminal Forensics
Preview
Report Post
Hack the Box Walkthrough: Cap
infosecwriteups.comยท1d
๐Ÿ“ŸTerminal Forensics
Preview
Report Post
Thumbing Through the DNS Traces of TamperedChef
circleid.comยท5h
๐ŸŒDNS Security
Preview
Report Post
OSINT Techniques Updates
inteltechniques.comยท14h
๐Ÿ”ŽOSINT Techniques
Preview
Report Post
SPDMark: Selective Parameter Displacement for Robust Video Watermarking
arxiv.orgยท22h
๐Ÿ‘๏ธPerceptual Hashing
Preview
Report Post
The Windows clipboard automatic text conversion algorithm is path-dependent
devblogs.microsoft.comยท1d
๐Ÿ”คUnicode Normalization
Preview
Report Post
DeepSeek-V3.2 + DocLing + Agentic RAG: Parse Any Document with Ease
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Archive Automation
Preview
Report Post
Digital Forensics Round-Up, December 10 2025
forensicfocus.comยท6d
๐Ÿ”Audio Forensics
Preview
Report Post
The Data Detox: Training Yourself for the Messy, Noisy, Real World
kdnuggets.comยท1d
๐ŸงชData science
Preview
Report Post
Rich Headers: leveraging this mysterious artifact of the PE format
virusbulletin.comยท3dยท
Discuss: Hacker News
๐ŸบFormat Archaeology
Preview
Report Post
Show HN: Solving Zodiac's Z32 โ€“ top candidate has anomaly visible from space
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Tape Forensics
Preview
Report Post
Mage: Cracking Elliptic Curve Cryptography with Cross-Axis Transformers
arxiv.orgยท22h
๐Ÿ”ฑGalois Cryptography
Preview
Report Post
Hackers are pretending to be cops – and tech companies keep falling for it
techspot.comยท4d
๐Ÿ”“Hacking
Preview
Report Post
Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models
arxiv.orgยท22h
๐Ÿ”คCharacter Classification
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.comยท4d
โœ…Format Verification
Preview
Report Post
CIC: Circular Image Compression
arxiv.orgยท22h
๐ŸŒ€Fractal Compression
Preview
Report Post
MLOps: Exploratory Data Analysis [EDA] Deriving Solutions with Statistics Leads to Fearure Engineering.
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Data Provenance
Preview
Report Post
CloudSEK Hiring CTF Writeup
infosecwriteups.comยท1d
๐ŸงชBinary Fuzzing
Preview
Report Post