๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ WARC Forensics

Web Archive Analysis, Internet Archaeology, Crawl Reconstruction, URL Timeline Analysis

How Open Data Editor empowers our weapon watch network
blog.okfn.orgยท1d
๐Ÿ”“Open Source Software
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comยท12h
๐Ÿ“Concrete Syntax
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.netยท5hยท
Discuss: Hacker News
๐ŸบKerberos Archaeology
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท20h
๐ŸŽซKerberos Exploitation
What LLMs Know About Their Users
schneier.comยท7hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
The Inefficiency in Digital Forensics
cyb3rops.medium.comยท2d
๐ŸšจIncident Response
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท2d
๐Ÿ”“Password Cracking
Almost Every Way Websites Fingerprint You
donutbrowser.comยท3dยท
Discuss: Hacker News
๐Ÿ‘๏ธPerceptual Hashing
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comยท22h
๐Ÿ”„Burrows-Wheeler
Watch out AI fans - cybercriminals are using jailbroken Mistral and Grok tools to build powerful new malware
techradar.comยท1d
๐Ÿ”“Hacking
Networking for Systems Administrators
mwl.ioยท5hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Detect Narrative Threats with AI Personas
askrally.comยท2dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Could Open Table Formats End the Reign of Snowflake and Databricks?
prequel.coยท1hยท
Discuss: Hacker News
๐Ÿ“šMARC Evolution
Look right: Threat campaign fooling developers in GitHub repos โ€“ Programmer Zone
quiz.businessexplain.comยท15hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Hyperlane Framework Deep Dive Real World Case๏ผˆ1750734743591400๏ผ‰
dev.toยท1dยท
Discuss: DEV
๐ŸŒNetworkProtocols
Semantic-Aware Parsing for Security Logs
arxiv.orgยท1d
๐Ÿ“Log Parsing
MemeMind: A Large-Scale Multimodal Dataset with Chain-of-Thought Reasoning for Harmful Meme Detection
arxiv.orgยท14h
๐ŸงฎVector Embeddings
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comยท3h
๐Ÿ‘๏ธSystem Observability
Show HN: Laburity โ€“ Dark and Deep Web Monitoring
laburity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap