🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📟 Terminal Forensics

Command History, Shell Analysis, User Behavior, Digital Investigation

Review: Catacomb 3-D
virtualmoose.org·11h
🏺Gaming Archaeology
The serial TX path seems to be down
qsantos.fr·4h
🔌Single Board PC
My Debian Activities in July 2025
blog.alteholz.eu·2d
❄️Nix Flakes
ATA Secure Erase
tinyapps.org·5d
💾Disk Utilities
Pam Bondi fired him for prosecuting January 6 rioters. He’d do it again: ‘it’s about justice’
theguardian.com·1d
🚨Incident Response
The Alarming Surge in Compromised Credentials in 2025
blog.checkpoint.com·3d
🔓Hacking
Grok’s Share and Claude’s Leak: 5 Things We Can Learn From System Prompts
machinelearningmastery.com·3d
📝ABNF Parsing
Show HN: Starter Repo for Rust CLI with built in database
deebkit.com·3d·
Discuss: Hacker News, r/commandline
🦀Rust Macros
AIxCC finals: Tale of the tape
blog.trailofbits.com·4d
🔒WASM Capabilities
Writing surtoget.no with gleam
lindbakk.com·3d·
Discuss: Lobsters, Hacker News
📡Feed Archaeology
'Suddenly deprecating old models' users depended on a 'mistake,' admits OpenAI's Altman
theregister.com·11h·
Discuss: Hacker News
🕸️WASM Archives
The International Obfuscated C Code Contest is back for 2024
theregister.com·2d
🧪Binary Fuzzing
How an attacker can downgrade Whatsapp encryption
heise.de·5h
🌊Stream Ciphers
Energy Experience Design
arxiv.org·20h
🔲Cellular Automata
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·5d
🛡️eBPF Security
The Cost of AI’s Speed Addiction: Why Generative AI Risks Collapsing Software Engineering
dev.to·5h·
Discuss: DEV
⚙️Proof Engineering
HTTP/1.1 Must Die: What This Means for AppSec Leadership
portswigger.net·5d
🌐BGP Security
Federated Learning with Differential Privacy for Edge-Based Anomaly Detection in Industrial IoT
dev.to·1d·
Discuss: DEV
🛡️Differential Privacy
Automated Neuroinflammation Profiling via Multi-Modal Bayesian Inference for Early Alzheimer's Detection
dev.to·1d·
Discuss: DEV
🌀Differential Geometry
Automated Compliance Risk Assessment via Probabilistic Graph Neural Networks
dev.to·15h·
Discuss: DEV
🔤EBCDIC Mining
Loading...Loading more...
AboutBlogChangelogRoadmap