๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“„ PDF Forensics

Document Investigation, PostScript Analysis, Structure Recovery, Digital Evidence

CloudNine Partners with eDiscovery AI to Enhance Review and Early Case Assessment with Generative AI Capabilities
cloudnine.comยท16h
๐Ÿ”—Data Provenance
On A.I. Video Watermarks
pxlnv.comยท2d
๐ŸŒŠAudio Watermarks
Decrypting DPAPI Credentials Offline
infosecwriteups.comยท23h
๐Ÿ•ธ๏ธWebAssembly
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท3d
๐Ÿ”NTLM Archaeology
Philips Hue White Ambiance is actually terribleโ€ฆ
wejn.orgยท15h
๐Ÿ”“Reverse engineering
Open Sesame: Poems with Entropy
benwr.netยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”“Password Cracking
What is peer review? The role anonymous experts play in scrutinizing research before it gets published
phys.orgยท1d
๐Ÿ“œText Collation
Computer-vision, Pi3 and losing hackathons
mtende.blogยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ–ฅRetro Computing
Armenian Extradited to US Over Ryuk Ransomware
darkreading.comยท10h
๐Ÿ”“Hacking
AI whiplash, and Neovim in the age of AI
dlants.meยท22hยท
Discuss: Hacker News, r/neovim
โœจEffect Handlers
ShopSmart AI - Revolutionary E-commerce Search with Algolia MCP Server
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘คSearch Personalization
4 Chinese APTs Attack Taiwan's Semiconductor Industry
darkreading.comยท4h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Cisco ISE maximum severity flaw lets hackers execute root code
techradar.comยท12h
๐Ÿ”“Hacking
Multi-Class-Token Transformer for Multitask Self-supervised Music Information Retrieval
arxiv.orgยท1h
๐ŸŽงLearned Audio
Can Multimodal Foundation Models Understand Schematic Diagrams? An Empirical Study on Information-Seeking QA over Scientific Papers
arxiv.orgยท2d
๐Ÿ“‹Document Grammar
Intra-view and Inter-view Correlation Guided Multi-view Novel Class Discovery
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
I built a CLI to catch prompt injection & LLM jailbreaks. Want to try it out?
dev.toยท11hยท
Discuss: DEV
โšกProof Automation
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท1d
๐ŸบKerberos Archaeology
A Guide to Fixed Asset Verification
dev.toยท2dยท
Discuss: DEV
โœ…Archive Validation
How We Built Our Internal E-E-A-T Content Analyzer with Froala
dev.toยท17hยท
Discuss: DEV
๐ŸŒณIncremental Parsing
Loading...Loading more...
AboutBlogChangelogRoadmap