๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—œ๏ธ ZIP Forensics

Archive Investigation, Metadata Recovery, Compression Analysis, Format Validation

Sneaky swirls: 'Hidden' vortices could influence how soil and snow move
phys.orgยท5h
๐ŸบComputational Archaeology
CLI Tools That Support Previews, Dry Runs or Non-Destructive Actions
nickjanetakis.comยท14h
๐Ÿ›ก๏ธCLI Security
Episode 163 - Ever Heard of the PDP-11?
adventofcomputing.libsyn.comยท1d
๐Ÿ’พvintage computing
A.I. Is Coming for Culture
newyorker.comยท1d
๐ŸŽฏContent Recommendation
Blast from the past: Facit A2400 terminal
jpmens.netยท16h
๐Ÿ’พvintage computing
NotebookLM's Video Overviews are now available in 80 languages
blog.googleยท22hยท
Discuss: Hacker News
๐ŸŽฌVideo Codecs
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท9hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
Winetricks/winetricks
github.comยท13h
๐Ÿ”„Sync Engine
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.ioยท14hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
7 Steps to Mastering No Code Automation with n8n for Data Professionals
kdnuggets.comยท1d
๐ŸŒŠStream Processing
MMCIG: Multimodal Cover Image Generation for Text-only Documents and Its Dataset Construction via Pseudo-labeling
arxiv.orgยท10h
๐Ÿ‘๏ธOCR Verification
Not So Prompt: Prompt Optimization as Model Selection
gojiberries.ioยท2dยท
Discuss: Hacker News
โš™๏ธCompression Benchmarking
Evaluation and LLM-Guided Learning of ICD Coding Rationales
arxiv.orgยท10h
๐Ÿ”—Constraint Handling
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท10h
๐ŸŒณArchive Merkle Trees
First Place Solution to the MLCAS 2025 GWFSS Challenge: The Devil is in the Detail and Minority
arxiv.orgยท10h
๐ŸงฎKolmogorov Complexity
Cracking the Density Code: Why MAF Flows Where KDE Stalls
towardsdatascience.comยท3d
๐Ÿ”—Tailscale
OpenBSD-Based Home Network: Router, Self-Hosting & Mesh Setup
discoverbsd.comยท2h
๐Ÿ”ŒOperating system internals
FRAME : Comprehensive Risk Assessment Framework for Adversarial Machine Learning Threats
arxiv.orgยท10h
๐Ÿฆ Malware Analysis
Building Swift Tech Now: a behind-the-scenes look at creating a modern tech blog with Python and C++
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
DocHop-QA: Towards Multi-Hop Reasoning over Multimodal Document Collections
arxiv.orgยท1d
๐Ÿ“‡Dublin Core
Loading...Loading more...
AboutBlogChangelogRoadmap