🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧠 Memory Forensics

RAM Analysis, Process Investigation, Volatile Evidence, Memory Dumps

Achieving SOTA LongMemEval scores (80%) with RAG alone
mastra.ai·6h·
Discuss: Hacker News
🏷️Memory Tagging
Don’t Waste Your Labeled Anomalies: 3 Practical Strategies to Boost Anomaly Detection Performance
towardsdatascience.com·9h
🌲B-tree Forensics
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
securityaffairs.com·18h
🦠Malware Analysis
CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
offsec.com·9h
🌐WASI
Digital Forensics Round-Up, July 16 2025
forensicfocus.com·1d
🚨Incident Response
A Programmer’s Guide to x86-64 Assembly (Series Overview)
blog.codingconfessions.com·1d
🔧RISC-V Assembler
Debugging the One-in-a-Million Failure: Migrating Pinterest’s Search Infrastructure to Kubernetes
medium.com·1d
👁️Observatory Systems
Trigon: exploiting coprocessors for fun and for profit (part 2)
alfiecg.uk·2d
🎮Switch Archaeology
Checking data integrity
eclecticlight.co·1d
✅Checksum Validation
🛡️ Paladin-mini: Open-Source Grounding Model That Actually Works in Production
dev.to·15h·
Discuss: DEV
⚡Proof Automation
Forensic journey: Breaking down the UserAssist artifact structure
securelist.com·3d
🔍NTLM Archaeology
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.com·1d
🔐Cryptographic Archaeology
Decrypting DPAPI Credentials Offline
infosecwriteups.com·20h
🕸️WebAssembly
Code Smells in Clojure
github.com·4h·
Discuss: Hacker News
🦀Rust Borrowing
How we tracked down a Go 1.24 memory regression
datadoghq.com·6h·
Discuss: Lobsters, Hacker News, r/programming
🧠Memory Allocators
<p>Someone needs to teach washing machine microcontroller engineers about non-volatile memory, so they can build machines that remember the last cycle and wash ...
lmika.org·2h
🔌Microcontrollers
Detection Engineering: Practicing Detection-as-Code – Repository – Part 2
blog.nviso.eu·18h
🔄Reproducible Builds
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·2d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
A Neural Net For a Graphing Calculator?
hackaday.com·18h
🤖Advanced OCR
Primary Attack Vectors Persist
sentinelone.com·5h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap