🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

An easy-to-implement, arena-friendly hash map
nullprogram.com·7h·
Discuss: Lobsters
🔐Hash Functions
Opportunity to work with the kernel filesystem, as the maintainer calls for assistance. EXT4 BUG converted to feature
lore.kernel.org·6h·
Discuss: r/linux
🔌Operating system internals
Crypto Recovery Specialist – Blockchain Investigator – Helping Victims Reclaim
news.ycombinator.com·7h·
Discuss: Hacker News
⛏️File Carving
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·18h
🛡️eBPF Security
Can a Client–Server Cache Tango Accelerate Disaggregated Storage?
muratbuffalo.blogspot.com·7h·
Discuss: www.blogger.com
⚡Cache Coherence
CfP: Human Rights Archives and the Problems of Provenance
archivespublishing.com·14h
⚖️Archive Ethics
Reverse-Engineering Game Boy Advance Games (and General Advice)
nytpu.com·1d
🎮Game Decompilation
Evading Data Provenance in Deep Neural Networks
arxiv.org·2d
🔍Vector Forensics
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·2d
⚗️Algebraic Coding
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
The Growing Threat of Mobile Infostealers
zimperium.com·15h
🛡️ARM TrustZone
What is EXIF data — and why it matters when sharing photos
proton.me·17h
💧Digital Watermarking
Building a Home Lab for Self-Hosting & Cybersecurity Labs - What Do You Think of This Setup ?
preview.redd.it·13h·
Discuss: r/homelab
🏠HomeLab
AI and Data Privacy Under Scrutiny
puri.sm·14h
🔒Privacy Archives
Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Password Vaults
darkreading.com·6h
🔓Hacking
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.com·13h
🛡Cybersecurity
Stop Exposed Secrets from Breaching Your Code Today: 4 Urgent Steps to Protect Your Organization
hackernoon.com·21h
🔓Hacking
Buffer Overflow Exploits: A Developer’s Nightmare
infosecwriteups.com·14h
🔓Hacking
Analysing Snapshot Isolation
muratbuffalo.blogspot.com·23h·
Discuss: Hacker News
🌳Persistent Data Structures
Prompt injection engineering for attackers: Exploiting GitHub Copilot
blog.trailofbits.com·1d
🛡️CLI Security
Loading...Loading more...
AboutBlogChangelogRoadmap