🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

Back from Display Next Hackfest 2025
bootlin.com·1d
🖥️Terminal Renaissance
Cloud Optimized GeoTIFF: Imagery format for cloud-native geospatial processing
cogeo.org·14h·
Discuss: Hacker News
📸PNG Optimization
CVE-2025-43253: Bypassing Launch Constraints on macOS
wts.dev·22h·
Discuss: Hacker News
🛡️CLI Security
Six Common Tactics Contractors Use to Upsell You
lifehacker.com·4h
📼Cassette Hacking
The Reviewer is Dead, Long Live the Review: Re-engineering Peer Review for the Age of AI
sigarch.org·2h·
Discuss: Hacker News
🤖AI Curation
There is no free lunch when dealing with engineering processes
taoem.com·22h·
Discuss: Hacker News
📏Code Metrics
WOO X Suffers $14 Million Breach Affecting 9 Users, Halts Withdrawals
dev.to·16h·
Discuss: DEV
🎫Kerberos Attacks
Bridging Cybersecurity and Critical Infrastructure: Vinay Adavi’s Breakthroughs
hackernoon.com·1d
🛡Cybersecurity
Police officer dismissed for sending racist and sexualised WhatsApp messages
the-independent.com·1d
🚨Incident Response
internet problems with lab when bridging virtual switch to public wifi
reddit.com·3d·
Discuss: r/homelab
🖥Home Lab Setup
RestoreAI - Pattern-based Risk Estimation Of Remaining Explosives
arxiv.org·3d
🔍Vector Forensics
Recovering Diagnostic Value: Super-Resolution-Aided Echocardiographic Classification in Resource-Constrained Imaging
arxiv.org·12h
🤖Advanced OCR
How I Spent My Vacation Day: Debugging Docker with AI (And Recovering 39GB)
dev.to·2d·
Discuss: DEV
🏠Homelab Archaeology
Exploiting Scale-Variant Attention for Segmenting Small Medical Objects
arxiv.org·12h
📊Count-Min Sketch
Linux 6.17 EDAC Code Supports Several Newer Intel CPUs
phoronix.com·7h
🔌Operating system internals
It’s ‘everywhere’ – Mozilla ramps up access with VPN now available on all Linux distros
techradar.com·1d
🔍eBPF
OpenCQRS – an open-source CQRS framework for the JVM
github.com·6h·
Discuss: Hacker News
🔐CBOR
Lovense adult toy app leaks private user email addresses - what we know, and how to stay safe if you're affected
techradar.com·2d
🔓Hacking
Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework
arxiv.org·2d
🎯Performance Proofs
NETGEAR, Inc. (NTGR) Q2 2025 Earnings Call Transcript
seekingalpha.com·1d
🔍NTLM Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap