Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·1h
🧪Binary Fuzzing
New Issue: Archives and Records
archivespublishing.com·1h
⚖️Archive Ethics
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.com·1d
⚖️Digital Evidence
10 Command-Line Tools Every Data Scientist Should Know
kdnuggets.com·3h
🤖Archive Automation
Efficient and accurate search in petabase-scale sequence repositories
nature.com·3m
🔄Burrows-Wheeler
Beginner to NAS...Build Advice?
preview.redd.it·21h·
Discuss: r/homelab
🦀Rusty Databases
Never Ever Use Content Addressable Storage
frederic.vanderessen.com·3h·
Discuss: Hacker News
🛡️Preservation Proofs
Nix pills
nixos.org·3d
❄️Nixpkgs
It takes a Kraken to scan billions of source files
softwareheritage.org·2h
🏠Homelab Archaeology
Preventing Internet Route Hijack with SIDRops Technology
ietf.org·1h
🛣️BGP Hijacking
Static Bundle Object: Modernizing Static Linking
medium.com·1d·
Discuss: Hacker News
🔗Static Linking
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·4h
🧬PostgreSQL Forensics
Algorithmic Archive Project: Use Cases (1/3)
blogs.bodleian.ox.ac.uk·1d
📊Citation Graphs
*** OFFICIAL Freeware Software Thread ***
forums.anandtech.com·1d
🏺ZIP Archaeology
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2h
📺VT100
How we trained an ML model to detect DLL hijacking
securelist.com·2d
🔗Binary Similarity
Adversary TTP Simulation Lab
infosecwriteups.com·1d
🏠Homelab Pentesting
Resolve a file’s path from its inode number
eclecticlight.co·9h
📦Deflate
Vacancy for Digital Archivist at SKAO
dpconline.org·4h
❄️Nordic Preservation