🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Archives

Steganographic Storage, Covert Preservation, Hidden Data Channels, Format Camouflage

DeepGo: Predictive Directed Greybox Fuzzing
arxiv.org·15h
🐛Fuzzing
Build Custom ActiveStorage Analyzers for Ruby on Rails
blog.appsignal.com·8h·
Discuss: Hacker News
🏺ZIP Archaeology
Cobalt Strike Beacon delivered via GitHub and social media
securelist.com·10h
🎫Kerberos Exploitation
Where Are They Now? Semi-Loved Recordable DVD/CDs Get Tested (Part 2)
goughlui.com·7h
💿Optical Media
Show HN: Dfembed is a Rust-powered Python lib turning DataFrames into vector db
github.com·9h·
Discuss: Hacker News
🗂️Vector Databases
What a bit bucket is
dfarq.homeip.net·8h
🕹️Game Preservation
AI Puts Your Personal Privacy at Risk
puri.sm·2h
🏠Personal Archives
Status update 2025-07
whynothugo.nl·19h
🔌Interface Evolution
A deeper dive into Spotlight indexes
eclecticlight.co·12h
🔍Search Indexing
2025 Unit 42 Global Incident Response Report: Social Engineering Edition
unit42.paloaltonetworks.com·9h
🔓Hacking
Your Signal, Their Data: Privacy Analysis of Wireless-Scanning SDKs in Android
dspace.networks.imdea.org·23h·
Discuss: Hacker News
📦Container Security
Reporting from the Born-Digital Collections, Archives and Memory Conference 2025
blogs.bodleian.ox.ac.uk·2d
🏛️PREMIS
I Made AI Personas Watch (and React to) the Astronomer Ad
askrally.com·1d·
Discuss: Hacker News
🗜️LZW Variants
Records and the ‘with’ operator, redux
codeblog.jonskeet.uk·23h
🛡️Proof-Carrying Archives
Nimble 'Gunra' Ransomware Evolves With Linux Variant
darkreading.com·22h
🌳Archive Merkle Trees
Symbolic-numeric programming in scientific computing
dspace.mit.edu·15h
🧬Functional Programming
BitVMX New Open Source Components: Key Management, Storage, and Configuration
bitvmx.org·1h·
Discuss: Hacker News
📦CBOR Extensions
How attackers are still phishing "phishing-resistant" authentication
bleepingcomputer.com·44m·
Discuss: Lobsters
🎯NTLM Attacks
Data Privacy Challenges in Open MCP Architectures
hackernoon.com·1d
🔒WASM Capabilities
Embeddings & Cosine Similarity Explained Simply
dev.to·1d·
Discuss: DEV
📐Vector Similarity
Loading...Loading more...
AboutBlogChangelogRoadmap