🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎞️ MKV Forensics

Video Container Analysis, Matroska Investigation, Media Recovery, Format Validation

New Research on HEVC Video Double Encoding Detection Published in Journal of Imaging
blog.ampedsoftware.com·6h
🖼️JPEG Forensics
Where's that shared library
narang99.github.io·6h·
Discuss: Hacker News, r/programming
🎮Game Decompilation
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·10h
🛡️eBPF Security
Digital Forensics Round-Up, August 06 2025
forensicfocus.com·4h
🔐Archive Cryptanalysis
Reverse-Engineering Game Boy Advance Games (and General Advice)
nytpu.com·20h
🎮Game Decompilation
Video-based Vehicle Surveillance in the Wild: License Plate, Make, and Model Recognition with Self Reflective Vision-Language Models
arxiv.org·1d
🤖Advanced OCR
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·1d
✅Archive Validation
External Network Penetration Testing and Best Practices
hackerone.com·3h
🕵️Penetration Testing
'Universal' detector spots AI deepfake videos with record accuracy
newscientist.com·2d
🔍Vector Forensics
Shelling Out Is Selling Out
petersobot.com·2d·
Discuss: Hacker News
🎞️MKV Internals
Real-time neural video codec – 100 FPS 1080p and 4K videos
github.com·1d·
Discuss: Hacker News
🧠Learned Codecs
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·2d
⚗️Algebraic Coding
Seedance 1.0: Architecture, Usage and Comparison
dev.to·1d·
Discuss: DEV
🎬WebCodecs
How Hash Maps Work
hackernoon.com·7h
🔐Hash Functions
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·1d
💿DAT Forensics
Building a Home Lab for Self-Hosting & Cybersecurity Labs - What Do You Think of This Setup ?
preview.redd.it·4h·
Discuss: r/homelab
🏠HomeLab
Prompt injection engineering for attackers: Exploiting GitHub Copilot
blog.trailofbits.com·16h
🛡️CLI Security
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.com·5h
🛡Cybersecurity
U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·14h
🛡Cybersecurity
️‍♂️ Tracking AgentTesla: Real-World Malware Behavior Analysis Using Joe Sandbox
infosecwriteups.com·1d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap