🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧠 Memory Forensics

RAM Analysis, Process Investigation, Volatile Evidence, Memory Dumps

Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·4h
🛡️eBPF Security
Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·1d·
Discuss: Hacker News, r/programming
🔩Systems Programming
Transaction Healing: Scaling Optimistic Concurrency Control on Multicores
muratbuffalo.blogspot.com·2h·
Discuss: www.blogger.com
⚡Hardware Transactional Memory
Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.com·2d
🚨Incident Response
Attack Surface Management Software: Top 10 Vendors
heimdalsecurity.com·2h
🔒WASM Capabilities
Automated Code Repair for C/C++ Static Analysis Alerts
arxiv.org·10h
📊Static Analysis
Should I upgrade my Fujitsu Futro S920 or start fresh with a better system?
reddit.com·23h·
Discuss: r/homelab
🖥Home Lab Setup
Performance Analytics
blog.jacobstechtavern.com·23h
📊Performance Profiling
Bouncing on trampolines to run eBPF programs
bootlin.com·1d
🔍eBPF
SIEVE — a better algorithm than LRU?
blog.apnic.net·1d
💨Cache Analysis
Project Ire autonomously identifies malware at scale
microsoft.com·22h·
Discuss: Lobsters, Hacker News
🦠Malware Analysis
The Growing Threat of Mobile Infostealers
zimperium.com·1h
🛡️ARM TrustZone
What I Learned About Machine Learning – Don’t Use It!
bobbydurrettdba.com·16h
👁️System Observability
Taming Go’s Garbage Collector with Memory Pools: A Practical Guide
dev.to·14h·
Discuss: DEV
🧠Memory Allocators
Learning About Threads: An Essential Guide for Developers
hackernoon.com·1d
🔩Systems Programming
Why Computer Science Is No Good, Redux
cacm.acm.org·21h
🎯Performance Proofs
Microsoft enabled Israeli spy agency's mass surveillance of Palestinians' mobile calls
metacurity.com·24m
🔓Hacking
Mobile app analytics library led to the PII exposure
cossacklabs.com·1d·
Discuss: Hacker News
🚨Incident Response
CVE-2025-54136 – MCPoison Cursor IDE: Persistent Code Execution via MCP Trust Bypass
research.checkpoint.com·1d
🏺Kerberos Archaeology
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·1d
💿DAT Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap