Feeds to Scour
SubscribedAll
Scoured 9589 posts in 1.09 s
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.ioยท1d
๐Ÿ”Cryptographic Archaeology
Preview
Report Post
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.toยท13hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
BankGPT TryHackMe Writeup Walkthrough
infosecwriteups.com
ยท16h
๐ŸบKerberos Archaeology
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioยท4hยท
Discuss: DEV
๐Ÿ”Capability Systems
Preview
Report Post
Use Providable to check file histories
eclecticlight.coยท1d
๐Ÿ”—Data Provenance
Preview
Report Post
Digital Forensics: Registry Analysis for Beginners, Part 1 โ€“ Hives, Logs, and Acquisition โ€“ Hackers Arise
hackers-arise.comยท1d
๐Ÿ”NTLM Forensics
Preview
Report Post
NEWS ROUNDUP โ€“ 26th December 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Preview
Report Post
My First Step into Security: Building a Zero-Knowledge Vault
blog.thnkandgrow.comยท1d
๐Ÿ”Archive Encryption
Preview
Report Post
Show HN: BrandRetina โ€“ screenshot similarity API for spear-phish detection
brandretina.aiยท1dยท
Discuss: Hacker News
๐Ÿ”—Binary Similarity
Preview
Report Post
From Intent to Proof: Dafny Verification for Web Apps
midspiral.comยท1dยท
๐Ÿ›๏ธAgda
Preview
Report Post
**Build Secure JWT Authentication and Session Management System in Go with Redis**
dev.toยท2dยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Arcan 0.7.1 โ€“ Minutes To Midnight
arcan-fe.comยท21hยท
๐Ÿ”ŒInterface Evolution
Preview
Report Post
Authenticating SSH Sessions with Secure Enclave
ewpratten.comยท2dยท
Discuss: Hacker News
๐Ÿ”PAKE Protocols
Preview
Report Post
Project idea: Bring โ€œEnterprise-Gradeโ€ SWG/DLP Concepts to the Homelab as an Easy Docker Privacy Gateway
reddit.comยท23hยท
Discuss: r/selfhosted
๐Ÿ Homelab Federation
Preview
Report Post
Amazon Bedrock: The AI Foundation Thatโ€™s Powering NatWest Bankโ€™s Digital Transformation
blog.devops.dev
ยท3d
๐ŸŒ€Brotli Internals
Preview
Report Post
From Email to Exfiltration: How Threat Actors Steal ADP Login and Personal Data
cofense.comยท4d
๐Ÿ”“Hacking
Preview
Report Post
Educational Byte: How Transparency Protects Crypto Users
hackernoon.comยท6d
๐Ÿ”—Hash Chains
Preview
Report Post
Security in Distributed Systems
blog.devops.devยท5d
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Fresh details emerge on remains of two Bronze Age people found by farmer
the-independent.comยท4d
๐ŸบArchaeological Computing
Preview
Report Post