๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“„ PDF Forensics

Document Investigation, PostScript Analysis, Structure Recovery, Digital Evidence

Read more: Fewer attacks on Swiss ATMs but their future remains uncertain
swissinfo.chยท10h
๐Ÿ‡จ๐Ÿ‡ฟTesla MIR
Global Cyber Attacks Surge 21% in Q2 2025 โ€” Europe Experiences the Highest Increase of All Regions
blog.checkpoint.comยท1d
๐ŸŽฏThreat Hunting
OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
tenable.comยท2d
๐Ÿ”CBOR
3 Deputies Are Killed in Explosion at Los Angeles Training Center
nytimes.comยท6h
๐Ÿ›กCybersecurity
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.infoยท5dยท
Discuss: r/programming
๐ŸšจIncident Response
Cybersecurity agency issues warning about end-of-train device vulnerability
trains.comยท1dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.orgยท1dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
The Power and Potential of Zero-Knowledge Proofs
cacm.acm.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Automating Dropbox to Google Drive Backups with n8n
dev.toยท22hยท
Discuss: DEV
๐Ÿค–Archive Automation
Can Multimodal Foundation Models Understand Schematic Diagrams? An Empirical Study on Information-Seeking QA over Scientific Papers
arxiv.orgยท2d
๐Ÿ“‹Document Grammar
Intra-view and Inter-view Correlation Guided Multi-view Novel Class Discovery
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Artificial Intelligence in Cybersecurity: Dual Use for Defense and Attack
dev.toยท15hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
The Shame of โ€œAlligator Alcatrazโ€
newyorker.comยท23h
โญAwesome lists
Northern California man arraigned on murder charge in Oregon for death of his then-girlfriend in 1980s cold case
mercurynews.comยท4h
๐ŸšจIncident Response
I built a CLI to catch prompt injection & LLM jailbreaks. Want to try it out?
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท2d
๐ŸบKerberos Archaeology
Primary Attack Vectors Persist
sentinelone.comยท1d
๐Ÿ”“Hacking
How We Built Our Internal E-E-A-T Content Analyzer with Froala
dev.toยท1dยท
Discuss: DEV
๐ŸŒณIncremental Parsing
More reliable bioinformatics tools for the study of proteins
phys.orgยท8h
๐ŸงฌCopy Number Variants
How to Add Generative UI to Any React App in 5 Minutes
dev.toยท23hยท
Discuss: DEV
๐Ÿ”—Concatenative Programming
Loading...Loading more...
AboutBlogChangelogRoadmap