Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐บ ZIP Archaeology
Archive Evolution, PKWARE Legacy, Compression History, Format Wars
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
22574
posts in
455.9
ms
Nation-State Actors
Exploit
Notepad
++ Supply Chain
unit42.paloaltonetworks.com
ยท
1d
๐ก๏ธ
eBPF Security
Make
everyday
tech work for you and your
household
the-independent.com
ยท
1h
โ๏ธ
DIY Electronics
drm
subsystem
AI patch review
airlied.blogspot.com
ยท
6h
ยท
Discuss:
airlied.blogspot.com
๐ซ
Kerberos Exploitation
REMnux
v8
: 15 Years of Building a Malware Analysis Toolkit
zeltser.com
ยท
2d
๐ฆ
Malware Analysis
Unofficial 7-zip.com website served up
malware-laden
downloads for over a week โ infected PCs forced into a proxy
botnet
tomshardware.com
ยท
1d
๐ฆ
Malware Analysis
7-Zip
/
Discussion
/ Open
Discussion
:
7-Zip
26.00
sourceforge.net
ยท
7h
ยท
Discuss:
Hacker News
๐ฃ
ZIP Vulnerabilities
Technical "
whitepaper
" for
afl-fuzz
lcamtuf.coredump.cx
ยท
22h
ยท
Discuss:
Lobsters
๐งช
Binary Fuzzing
LoRA-Squeeze
: Simple and Effective Post-Tuning and In-Tuning Compression of
LoRA
Modules
arxiv.org
ยท
1d
๐ช๏ธ
Brotli
Introducing GPTโ5.3โ
Codex
โ
Spark
simonwillison.net
ยท
16h
๐ฆ
Rust Macros
My Experience Using
OpenClaw
: A Security
Professional
โs Journey
simonroses.com
ยท
3h
๐
Nordic Shell
650:
Korn
Chips
bsdnow.tv
ยท
23h
๐ผ
Cassette Archaeology
Newsletter
Subscription
newsletter.nixers.net
ยท
7h
๐ก
RSS
Error'd:
Cruel
Brittanica
thedailywtf.com
ยท
7h
๐ฟ
EBCDIC Archaeology
Automating
AV
Archival
Workflows: Part 3
eddycolloton.com
ยท
2d
๐ค
Archive Automation
How a Small
OSINT
Team Turned the Epstein Files Dump Into
Actionable
Intelligence
hackernoon.com
ยท
8h
๐
Hacking
Unleash
your ideas with
ASCII
monosketch.io
ยท
1h
ยท
Discuss:
Hacker News
๐
Terminal Typography
MerkleSpeech
: Public-Key Verifiable,
Chunk-Localised
Speech Provenance via Perceptual Fingerprints and Merkle Commitments
arxiv.org
ยท
1d
๐
FLAC Forensics
How to Build
Scalable
Data
Pipelines
: Lessons from the Data Engineering Book
dev.to
ยท
3h
ยท
Discuss:
DEV
๐
Stream Processing
Malicious 7-Zip site
distributes
installer
laced
with proxy tool
bleepingcomputer.com
ยท
2d
๐ฃ
ZIP Vulnerabilities
Building an Embedding API with Rust, Arm, and
EmbeddingGemma
on AWS
Lambda
sobolev.substack.com
ยท
2h
ยท
Discuss:
Substack
๐
Brotli Dictionary
Loading...
Loading more...
« Page 1
โข
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help