🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💿 Optical Forensics

CD Analysis, Media Recovery, Laser Tracking, Error Patterns

Mega Review: REEKÖN T1 Tomahawk Digital Tape Measure (ft. ROCK Jobsite App)
goughlui.com·2d
⚙️Cassette Mechanics
Ultimate Lab Resource for VCF 9.0
williamlam.com·7h
🏠HomeLab
Kumo Surfaces Structured Data Patterns Generative AI Misses
thenewstack.io·14h
📊Graph Databases
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.uk·1d
🔐Quantum Security
What are memories made of? A survey of neuroscientists
journals.plos.org·2h·
Discuss: Hacker News
🧲Magnetic Domains
Abusing copyright strings to trick software into thinking it’s running on your competitor’s PC
devblogs.microsoft.com·1d·
Discuss: Lobsters, Hacker News
🏺Kerberos Archaeology
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·14h·
Discuss: Hacker News
📋DFDL
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.com·14h·
Discuss: Substack
🦀Rust Macros
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.to·16h·
Discuss: DEV
🔐Homomorphic Encryption
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.com·13h
👁️System Observability
This Blink Outdoor Security Camera System Is at Its Lowest Price Right Now
lifehacker.com·16h
🎬Video Codecs
Today it's cheating, tomorrow it's fair. Cluely for B2B mystery shopping
hovrai.com·2d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.com·1d
🔬Archive Forensics
👹 Longest Binary Subsequence K – LeetCode 2311 (C++ | JavaScript | Python )
dev.to·4h·
Discuss: DEV
λLambda Encodings
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·20h
🦠Malware Analysis
VFArch\=e: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software
arxiv.org·2d
🛡️eBPF Security
Flame Graph Performance Truth Analysis(1750839255230100)
dev.to·20h·
Discuss: DEV
⚡Performance Tools
Observability in the Age of AI
blog.buildrappo.com·43m·
Discuss: Hacker News
👁️System Observability
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.com·1d
🎯NTLM Attacks
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·1h
📃Manuscript Tokenization
Loading...Loading more...
AboutBlogChangelogRoadmap