🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

What's new with Himitsu 0.9?
drewdevault.com·2d
🔌Operating system internals
Talk about an unexpected charge - criminals deploy Raspberry Pi with 4G modem in an attempt to hack ATMs
techradar.com·1d
🔓Hacking
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
unit42.paloaltonetworks.com·3d
🔓Hacking
Reverse-Engineering cuBLAS (2024)
accu.org·7h·
Discuss: Hacker News
🖥️Terminal Renaissance
Exploring AI Memory Architectures (Part 2): MemOS Framework
blog.lqhl.me·16h·
Discuss: Hacker News
⚡Hardware Transactional Memory
6 Impossible Puzzles With Surprising Solutions
mindyourdecisions.com·25m
🔲Cellular Automata
original ↗
wingolog.org·3d·
Discuss: Hacker News
🔩Systems Programming
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction
arxiv.org·2d
🌀Brotli Internals
Irmin Retrospective
patrick.sirref.org·1d·
Discuss: Lobsters, Hacker News
🔌Archive APIs
Hunting Bugs in Perf_event2
roci.co.za·3h·
Discuss: Hacker News
🔍eBPF
[Media] TuneIn CLI: Browse and listen to thousands of radio stations across the globe right from your terminal!
reddit.com·6h·
Discuss: r/rust
📟Terminal Forensics
Remove Old iMessage Attachments
github.com·23h·
Discuss: Hacker News
🍎Apple Archive
HTB Dog Walkthrough
infosecwriteups.com·12h
📟Terminal Forensics
Reading List 08/09/2025
construction-physics.com·1d
🌡️Preservation Physics
The Alarming Surge in Compromised Credentials in 2025
blog.checkpoint.com·2d
🔓Hacking
The Devil in the Skies
hackernoon.com·2d
🛡Cybersecurity
An easy-to-implement, arena-friendly hash map
nullprogram.com·3d·
Discuss: Lobsters
🔐Hash Functions
FreeBSD Security Advisory: Integer Overflow in libarchive
discoverbsd.com·2d
🔌Operating system internals
Principles and Methodologies for Serial Performance Optimization
usenix.org·5h·
Discuss: Hacker News
⚙️Batch Processing
Exploring Traces: Agent trajectory walkthroughs from interesting examples
theori.io·1d·
Discuss: Hacker News
🧬Bitstream Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap