Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Format Forensics
File Carving, Header Analysis, Magic Numbers, Digital Evidence
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17083
posts in
192.8
ms
Can We Build a Monolithic Model for Fake Image Detection?
SICA
: Semantic-Induced Constrained Adaptation for
Unified-Yet-Discriminative
Artifact Feature Space Re...
arxiv.org
Β·
1d
π
Vector Forensics
New
Clickfix
variant β
CrashFix
β deploying Python Remote Access Trojan
microsoft.com
Β·
4d
π«
Kerberos Exploitation
Open-access software tool
helps
researchers spot fake
journals
phys.org
Β·
6d
π§
Manuscript Watermarks
What is
OCR
? (And 4 Real-World Use
Cases
)
dev.to
Β·
4d
Β·
Discuss:
DEV
π
OCR
π§© Build a Pattern History Printer
GUI
App with Python &
Tkinter
(Step-by-Step)
dev.to
Β·
3d
Β·
Discuss:
DEV
π
Terminal Typography
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
Β·
3d
Β·
Discuss:
Hacker News
,
r/programming
π§ͺ
Binary Fuzzing
Fake Installer:
Ultimately
,
ValleyRAT
infection
cybereason.com
Β·
6d
π
Terminal Forensics
wkyleg/personal-genomics
: Analyze your DNA with OpenClaw
github.com
Β·
3d
Β·
Discuss:
Hacker News
π³
Format Genealogy
Making
Pyrefly
Diagnostics
18x Faster
pyrefly.org
Β·
4d
Β·
Discuss:
Hacker News
π³
Incremental Parsing
Found art
robinsloan.com
Β·
5d
π
Mathematical Art
Stop
Torturing
Your Data: How to Automate
Rigor
With AI
hackernoon.com
Β·
6d
β‘
Proof Automation
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
Β·
4d
Β·
Discuss:
Substack
π―
Threat Hunting
What Is a
Brute
Force Attack and How to
Prevent
It
securityscorecard.com
Β·
6d
π
Password Cracking
a review-first
duplicate
file finder powered by
BLAKE3
duobolt.app
Β·
5d
Β·
Discuss:
Hacker News
βοΈ
File Carving
LocateEdit-Bench
: A Benchmark for
Instruction-Based
Editing Localization
arxiv.org
Β·
4d
π·οΈ
Memory Tagging
Open access, generative artificial intelligence, and the
criminology
evidence
base
crimrxiv.com
Β·
4d
Β·
Discuss:
Hacker News
π
Digital humanities
Tools for
Recovering
RAID5
Disasters
github.com
Β·
4d
Β·
Discuss:
Hacker News
πΎ
Archive RAID
Follow the Changes: 9 Ways Web
Archives
are Used in Digital
Investigations
(Internet Archive Blog)
rbfirehose.com
Β·
4d
π
Web Archiving
Show HN:
TalentLyt
β A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
Β·
4d
Β·
Discuss:
Hacker News
π―
Threat Hunting
Show HN:
StatCalc
β Statistical Calculator with Clear
Visualizations
echomoltinsson.github.io
Β·
4d
Β·
Discuss:
Hacker News
π
Count-Min Sketch
Loading...
Loading more...
« Page 3
β’
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help