๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฆ  Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

Revisiting Recent Files
irreal.orgยท5h
๐Ÿ”„Language Evolution
The time I literally dropped a server
blog.waleson.comยท26mยท
Discuss: blog.waleson.com
โ„๏ธNix Flakes
North Korea Attacks South Koreans With Ransomware
darkreading.comยท3d
๐Ÿ”“Hacking
The future of large files in Git is Git
tylercipriani.comยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ“ฆGit LFS
Minesweeper game in 100 lines of pure JavaScript - easy tutorial
slicker.meยท1d
๐Ÿ”ฒCellular Automata
githubnext/monaspace
github.comยท1d
๐Ÿ”คFont Archaeology
Fabricated data in posts.xml for multiple/all data dumps
meta.stackexchange.comยท4dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Protect Your Python Secrets Like a Pro with PyShield-Secure
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Appleโ€™s Private Cloud Compute vs. Confidential Computing
thenewstack.ioยท2d
๐ŸŒŠStream Ciphers
Title: The Fusion of Human and Machine: US Nuclear Weapons and Materials Research
dev.toยท21hยท
Discuss: DEV
๐Ÿ”Vector Forensics
I finally have a 3-2-1 backup strategy!
reddit.comยท2dยท
Discuss: r/homelab
๐Ÿ’ฟBackup Strategies
Securing Meta's Production PKI Credentials
usenix.orgยท4d
๐ŸŽฏNTLM Attacks
Pakistani-based malware empire 'punished' software pirates with infostealers, earning millions of dollars in just five years - here's how to stay safe
techradar.comยท11h
๐Ÿดโ€โ˜ ๏ธPiracy
GenHuzz: An Efficient Generative Hardware Fuzzer
usenix.orgยท4d
๐ŸงชRISC-V Fuzzing
To Sp or Not To Sp
hackernoon.comยท3d
๐Ÿ—„๏ธType-safe Archives
Automated Open Data Integrity Verification via Multi-Modal Anomaly Detection and Recursive Scoring
dev.toยท1dยท
Discuss: DEV
๐ŸŒฒB-tree Forensics
Comparison of Generic Container Libraries for C
github.comยท4dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Psst: wanna buy a legit FBI email account for $40?
theregister.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Automated Fault Characterization via Dynamic Behavioral Fingerprinting in Embedded Systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Searching for Privacy Risks in LLM Agents via Simulation
arxiv.orgยท2d
๐Ÿ”’WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap