🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧠 Memory Forensics

RAM Analysis, Process Investigation, Volatile Evidence, Memory Dumps

Exploring Traces: Agent trajectory walkthroughs from interesting examples
theori.io·16h·
Discuss: Hacker News
🧬Bitstream Evolution
Automated Vulnerability Prioritization via Graph Neural Networks and Symbolic Execution
dev.to·4h·
Discuss: DEV
📏Code Metrics
More testing of the 1130 MRAM memory replacement board - part 1
rescue1130.blogspot.com·6h·
Discuss: rescue1130.blogspot.com
⚡Circuit Archaeology
Digital Forensics Round-Up, August 06 2025
forensicfocus.com·3d
🔐Archive Cryptanalysis
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·3d
🛡️eBPF Security
Exploring AI Memory Architectures (Part 2): MemOS Framework
blog.lqhl.me·3h·
Discuss: Hacker News
⚡Hardware Transactional Memory
ATA Secure Erase
tinyapps.org·3d
💾Disk Utilities
Effective Strategies for Threat and Vulnerability Management
vmray.com·1d
🎯Threat Hunting
Hyper-V Research
r0keb.github.io·16h
👑RISC-V Privilege
UK Courts Service 'Covered Up' IT Bug That Lost Evidence
yro.slashdot.org·1d
⚖️Digital Evidence
WHP Top 10 Covert Entry Vulnerabilities
wehackpeople.wordpress.com·9h
🔓Hacking
Thumbnail forensics. DFIR techniques for analysing Windows Thumbcache
pentestpartners.com·1d
🔍Format Forensics
original ↗
wingolog.org·3d·
Discuss: Hacker News
🔩Systems Programming
Sophos AI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
news.sophos.com·2d
🎯Threat Hunting
Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·2h
🔓Hacking
We need better ways to evaluate how AI memory systems perform
cognee.ai·1d·
Discuss: Hacker News
⚡Performance Mythology
A CT scanner reveals surprises inside the 386 processor's ceramic package
righto.com·11h·
Discuss: www.blogger.com, Lobsters
⚡Circuit Archaeology
Performance Pitfalls in C# / .NET – List Contains
richardcocks.github.io·13h·
Discuss: Hacker News
📏Code Metrics
Black Hat: AI as vulnerability scout and gap in Spectre protection
heise.de·1d
🔓Hacking
Automated Anomaly Detection in Distributed System Log Streams via Graph-Based Temporal Pattern Recognition
dev.to·9h·
Discuss: DEV
📝Log Parsing
Loading...Loading more...
AboutBlogChangelogRoadmap