๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Format Reverse Engineering

Binary Analysis, Structure Recovery, Protocol Discovery, Legacy Formats

Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท1d
๐Ÿ”ขBitwise Algorithms
A Standard for Human-Centered Investigation Playbooks
chrissanders.orgยท3h
๐ŸŽฏThreat Hunting
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท15h
๐Ÿ›๏ธMainframe Archaeology
Networking for Systems Administrators
mwl.ioยท9hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Beyond Frameworks: How Computer Science Fundamentals Forge the Complete Developer
dev.toยท8hยท
Discuss: DEV
๐Ÿ“Code Metrics
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท14h
๐Ÿ”NTLM Forensics
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
Xcode 26 Beta 2
mjtsai.comยท53m
๐Ÿ”—Static Linking
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comยท16h
๐Ÿ“Concrete Syntax
Modernizing eDiscovery: A Huge Strategic Win for Legal Operations Executives
blog.x1discovery.comยท3h
๐Ÿ”—Data Provenance
XOR Marks the Flaw in SAP GUI
darkreading.comยท9h
๐Ÿ”“Hacking
How to Prove That An Email Was Received
metaspike.comยท2h
๐Ÿ“„Document Digitization
How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era
techspot.comยท3h
๐Ÿ”’Hardware Attestation
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท10h
๐Ÿฆ Malware Analysis
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท7hยท
Discuss: Substack
๐Ÿฆ€Rust Macros
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comยท6h
๐Ÿ‘๏ธSystem Observability
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท1d
๐Ÿ”—Data Provenance
Kumo Surfaces Structured Data Patterns Generative AI Misses
thenewstack.ioยท8h
๐Ÿ“ŠGraph Databases
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท8h
๐Ÿ”ฌArchive Forensics
Software Heritage: The next chapter
softwareheritage.orgยท9h
๐Ÿ›๏ธOAIS Implementation
Loading...Loading more...
AboutBlogChangelogRoadmap