🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧠 Memory Forensics

RAM Analysis, Process Investigation, Volatile Evidence, Memory Dumps

How to Slow Down a Program? And Why it Can Be Useful.
stefan-marr.de·5h·
Discuss: Lobsters, Hacker News
🚀Compiler Optimizations
Digital Forensics Round-Up, August 27 2025
forensicfocus.com·56m
🔬Archive Forensics
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.com·23h
👁️System Observability
The Deployment Error That Nearly Took Down My App
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
Log Detective: GSoC 2025 (part 2)
danigm.net·10h
🔓Open Source Software
(繁中) The Art of PHP — My CTF Journey and Untold Stories!
blog.orange.tw·13h
🇨🇳Chinese Computing
Using panic metadata to recover source code information from Rust binaries | cxiao.net
cxiao.net·1d
🦀Rust Macros
Detecting and countering misuse of AI: August 2025
anthropic.com·15h·
Discuss: Hacker News
🕵️Vector Smuggling
Binary Exploitation 101 - Introduction
r1ru.github.io·1d
📼Cassette Hacking
HP EliteDesk 800 G3 Mini RAM upgrade
reddit.com·3h·
Discuss: r/homelab
🗃️Punch Card Recovery
Beyond the Checkbox: How Backblaze’s SOC 2 Type 2 Certification Secures Your Cloud Data
backblaze.com·53m
✅Archive Fixity
NEWS ROUNDUP – 27th August 2025
digitalforensicsmagazine.com·1h
🌐DNS Security
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
isc.sans.edu·9h
🛡️CLI Security
Thoughts on creating a tracking pointer class, part 13: Restoring the strong exception guarantee
devblogs.microsoft.com·1h
🦀Rust Borrowing
Tencent Cloud sites breached to expose valuable data - here's what we know
techradar.com·42m
🔓Hacking
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.org·11h
🔍Vector Forensics
How we built the most efficient inference engine for Cloudflare’s network
blog.cloudflare.com·1h
🌊Stream Processing
Exploits and vulnerabilities in Q2 2025
securelist.com·5h
🔓Hacking
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·2d
🧪Binary Fuzzing
More vulnerable stalkerware victims’ data exposed in new TheTruthSpy flaw
malwarebytes.com·3h
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap