🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

Binary Exploitation 101 - Introduction
r1ru.github.io·18h
📼Cassette Hacking
Ransomware-Resilient Storage
infoq.com·13h·
Discuss: Hacker News
💿WORM Storage
Auditing Approximate Machine Unlearning for Differentially Private Models
arxiv.org·5h
🛡️Differential Privacy
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.org·8h
🦀Embedded Rust
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·1d·
Discuss: Hacker News
🔐Archive Encryption
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.net·19h
🦀Rust Macros
Pioneering 'soft box' provides affordable protection for human remains and archaeological finds
phys.org·13h
📼Cassette Archaeology
(繁中) The Art of PHP — My CTF Journey and Untold Stories!
blog.orange.tw·7h
🇨🇳Chinese Computing
Optimize Go Performance: Value vs. Pointer Types for Fewer Memory Allocations
dev.to·8h·
Discuss: DEV
🧠Memory Allocators
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.com·19h
👁️Perceptual Hashing
Securing FreeBSD Services with Lightweight Jails
discoverbsd.com·1d
🗄️File Systems
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.com·19h
📐Geometric Hashing
Music to Break Models By
matthodges.com·1d·
Discuss: Hacker News
📼Cassette Hacking
The hidden threat in enterprise security: why it’s time to rethink PDFs
techradar.com·1h
📄PDF Archaeology
Hook Android Trojan Now Delivers Ransomware-Style Attacks
darkreading.com·15h
🔓Hacking
The Glorious Future of the Book
honest-broker.com·13h
💿WORM Storage
Make and SQL: An old new way for Data Science workloads
vasvir.wordpress.com·15h·
Discuss: Hacker News
🦀Rust Macros
BW21-CBV-Kit——Home Video Monitoring and Playback System
hackster.io·3h
🎬Video Codecs
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·2d
🧪Binary Fuzzing
InfoSec News Nuggets 8/26/2025
aboutdfir.com·18h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap