🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🗜️ ZIP Forensics

Archive Investigation, Metadata Recovery, Compression Analysis, Format Validation

FBI Seizes Gaming Piracy Domains including ‘Pre-Release’ Target NSW2U
torrentfreak.com·4h·
Discuss: r/Piracy
🏴‍☠️Piracy
Decoding TCP SYN for stronger network security
blog.apnic.net·2d
📊PCAP Analysis
The Case for Compact AI
cacm.acm.org·8h
🎵Audio ML
Open Source Tools to Detect CVE-2024-54085
eclypsium.com·2h·
Discuss: Hacker News
🔍eBPF
Curated List of Windows Utilities
orga.cat·2d·
Discuss: Hacker News
🕸️WASM Archives
YouTube channel mirror on Jekyll - part 4
dev.to·7h·
Discuss: DEV
🧪Archive Fuzzing
Machine Learning Fundamentals: cross validation with python
dev.to·7h·
Discuss: DEV
📏Code Metrics
Expediting data extraction using a large language model (LLM) and scoping review protocol: a methodological study within a complex scoping review
arxiv.org·20h
🔄Archival Workflows
Structuring unstructured data is a correct use of AI
mechanicalsurvival.com·16h·
Discuss: Hacker News
📋Document Grammar
JECQ: Smart, Open-Source Compression for FAISS Users—6x Compression Ratio, 85% Accuracy
dev.to·1d·
Discuss: DEV
📊Quantization
So, I decided to write a BUFR decoder
stormscale.io·3d·
Discuss: Hacker News
📋DFDL
Show HN: I built an AI tool to retrieve technical achievements from your GitHub
git-achievements.com·9h·
Discuss: Hacker News
🌀Brotli Internals
Reframe – Open‑Source ISO20022 Message Transformer in Rust
github.com·10h·
Discuss: Hacker News
🔐CBOR
eSIM security research (GSMA eUICC compromise and certificate theft)
seclists.org·1d·
Discuss: Hacker News
🏺Kerberos Archaeology
Icechunk 1.0: Production-Grade Cloud-Native Array Storage Is Here
earthmover.io·4h·
Discuss: Hacker News
🧊Arctic Storage
25 Additional Problems -- Extension to the Book "125 Problems in Text Algorithms"
arxiv.org·1d
🔤Morris-Pratt
Approach to mainframe penetration testing on z/OS. Deep dive into RACF
securelist.com·2d
🗄️Database Internals
How to Convert a String to Bytes in Python
dev.to·15h·
Discuss: DEV
📦Deflate
Disappearing Ink: Obfuscation Breaks N-gram Code Watermarks in Theory and Practice
arxiv.org·1d
💧Digital Watermarking
The Simple Engineer's Approach to File Size Reduction
dev.to·1d·
Discuss: DEV
🏺ZIP Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap