Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏺 ZIP Archaeology
Archive Evolution, PKWARE Legacy, Compression History, Format Wars
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19421
posts in
1.52
s
cynthia2006/zipinspect
: Small utility to inspect/extract zip files over HTTP
github.com
·
16m
🗜️
ZIP Forensics
Lightening
the robotic
scraping
: Insights for a ‘green’ cache from the Software Heritage archive
diff.wikimedia.org
·
15h
🤖
Archive Automation
Cleaning Dirty Data in Legacy Go
Codebases
: A Lead
QA
Engineer's Approach
dev.to
·
13h
·
Discuss:
DEV
🏺
Database Archaeology
AIStor
Tables: Native Iceberg V3 for
On-Premises
Object Storage
blog.min.io
·
1d
🏺
Database Archaeology
RFC 3284: The
VCDIFF
Generic
Differencing
and Compression Data Format
datatracker.ietf.org
·
1d
·
Discuss:
Hacker News
△
Delta Compression
Dumping
Nintendo e‑Reader Card “
ROMs
”
sethmlarson.dev
·
14h
🎮
Cartridge Dumping
Valuable
News
discoverbsd.com
·
1d
🔌
Operating system internals
First Steps,
Lasting
Impact: Platform-Aware
Forensics
for the Next Generation of Analysts
arxiv.org
·
1d
🧬
PostgreSQL Forensics
Enterprise Podman Security:
Rootless
Containers,
SELinux
, Backups & Docker Comparison
blog.nviso.eu
·
1d
·
Discuss:
r/selfhosted
📦
Container Security
22.00.0182
JDex
deep-dive
: data and storage options
johnnydecimal.com
·
1d
🗄️
Database Internals
Aptik
v26.02
teejeetech.com
·
14h
🔌
Operating system internals
Fixing
Links with the
Wayback
Machine
automattic.com
·
2h
·
Discuss:
Hacker News
🌐
Web Archiving
The €10
Mirror
: Why Enterprise Security Looks Like a
Kid
’s Toy
labs.itresit.es
·
7h
·
Discuss:
Hacker News
💿
WORM Storage
Convert
&
Compress
frontendmasters.com
·
23h
📦
Deflate
Sampling the
Oxford
CS
Library
blog.computationalcomplexity.org
·
3h
·
Discuss:
blog.computationalcomplexity.org
⛏️
Proof Mining
Fake Installer:
Ultimately
,
ValleyRAT
infection
cybereason.com
·
1d
📟
Terminal Forensics
Self-hosted log
aggregation
in a single
binary
glintlog.com
·
4h
·
Discuss:
Hacker News
📝
Log Parsing
Detecting and
Explaining
Malware Family Evolution Using Rule-Based
Drift
Analysis
arxiv.org
·
9h
🦠
Malware Analysis
Lossless
Extract
2.1.6
majorgeeks.com
·
15h
🎧
FLAC Encoding
Devices
windowsir.blogspot.com
·
1d
·
Discuss:
Blogger
💿
DAT Forensics
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help