🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

Automated Function ID Database Generation in Ghidra on Windows
blog.mantrainfosec.com·5h·
Discuss: Hacker News
🔓Decompilation
Machine Learning Fundamentals: dimensionality reduction tutorial
dev.to·1h·
Discuss: DEV
📐Vector Dimensionality
Detection Engineering: Practicing Detection-as-Code – Repository – Part 2
blog.nviso.eu·9h
🔄Reproducible Builds
Checking data integrity
eclecticlight.co·1d
✅Checksum Validation
Decrypting DPAPI Credentials Offline
infosecwriteups.com·11h
🕸️WebAssembly
A Programmer’s Guide to x86-64 Assembly (Series Overview)
blog.codingconfessions.com·1d
🔧RISC-V Assembler
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·1d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Openreach plans to remove 100 tonnes of plastic from supply chain
the-independent.com·7h
🕸️Mesh Networks
State of the Art of Prompt Engineering • Mike Taylor • GOTO 2025
youtube.com·5h
🖥️Terminal Renaissance
Adoption agency leaks over a million records
malwarebytes.com·2h
🔤EBCDIC Privacy
Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.com·18h
🔓Password Cracking
Undone Computer Science
undonecs.org·5h·
Discuss: Hacker News
🌍Cultural Algorithms
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.org·13h
🔐Quantum Security
A Wide Reduction Trick (2022)
words.filippo.io·14h·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.com·18h
🔐Cryptographic Archaeology
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.com·9h
🌐DNS Security
An engineer’s path from data loss to software preservation
softwareheritage.org·1d
🔄Archival Workflows
“Re-geeking” with the Mac and amateur radio ↦
sixcolors.com·1d
💾vintage computing
How to Use Knowledge Enrichment to Transform Unstructured Data
info.aiim.org·6h
🤖Archive Automation
Hardware/Tools I Find Most Useful In My Lab
reddit.com·20h·
Discuss: r/homelab
🏠Homelab
Loading...Loading more...
AboutBlogChangelogRoadmap