๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Format Forensics

File Carving, Header Analysis, Magic Numbers, Digital Evidence

Historic paintings are being reborn with MIT's AI-based restoration method
techspot.comยท1dยท
Discuss: r/technews
๐Ÿ“„Document Digitization
Week 25 โ€“ 2025
thisweekin4n6.comยท3d
๐ŸŒWARC Forensics
Show HN: A free tool to extract audio from video
extractaudio.proยท2hยท
Discuss: Hacker News
๐ŸŽงFLAC Encoding
FileFix โ€“ A ClickFix Alternative
mrd0x.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
The modern text processing pipeline: Overview
newroadoldway.comยท1dยท
Discuss: Lobsters, r/programming
๐Ÿ”คUnicode Normalization
Inverse text-sizing based on text-length with attr()
daverupert.comยท3h
๐Ÿ–‹Typography
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toยท4hยท
Discuss: DEV
๐Ÿง Machine Learning
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท9h
๐ŸŽซKerberos Attacks
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deยท9h
๐ŸŽซKerberos Exploitation
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgยท21hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWebP Analysis
XOR Marks the Flaw in SAP GUI
darkreading.comยท5h
๐Ÿ”“Hacking
[$] Libxml2's "no security embargoes" policy
lwn.netยท2h
๐Ÿ”“Free and open source
Sextortion email scammers increase their “Hello pervert” money demands
malwarebytes.comยท8h
๐ŸŽซKerberos Attacks
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท1d
๐Ÿ’ฟOptical Forensics
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท3h
๐ŸŽฏThreat Hunting
Finding Outliers in Proportions
crimede-coder.comยท2hยท
Discuss: Hacker News
๐Ÿ“ŠCount-Min Sketch
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท20h
๐ŸŽซKerberos Exploitation
The Interactive Handbook on Data Structures and Algorithms
cartesian.appยท1dยท
Discuss: Lobsters, Hacker News, Hacker News
๐ŸŒณTrie Structures
Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated
arxiv.orgยท14h
๐ŸงฎKolmogorov Complexity
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท10h
๐Ÿ”NTLM Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap