🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Memory Forensics

Data Recovery, System Analysis, Security Investigation, Memory Dumps

After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.info·4h·
Discuss: r/programming
🦠Malware Analysis
C++ Is The GOAT — Part 2: Memory Management Mastery 🧠💾
dev.to·7h·
Discuss: DEV
🛡️Memory Safety
sca-fuzzer: Revizor - a fuzzer to search for microarchitectural leaks in CPUs
github.com·20h·
Discuss: Lobsters, Hacker News
📈Performance Profiling
Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: A RBTree Family Drama (Part One)
syst3mfailure.io·59m·
Discuss: Lobsters, Hacker News
🦀Rust Scientific
Machine Learning Fundamentals: data preprocessing tutorial
dev.to·2h·
Discuss: DEV
🏗data engineering
The Class Imbalance Problem: How I Achieved 89% Accuracy on Customer Churn Prediction
github.com·1h·
Discuss: DEV
⏱️Real-time Analytics
A little help with older laptop.
reddit.com·10h·
Discuss: r/linux
🛡️Memory Safety
What Will It Take to Restore a Serious Flight Simulator?
hackaday.com·11h
🦠Malware Analysis
Roslyn CodeFix for updating code
dev.to·4h·
Discuss: DEV
📋Tokei
Rust vs. C: A Deep Dive
ponderwall.com·22h·
Discuss: r/programming
🛡️Memory Safety
Tryhackme - Cyber Kill Chain
csoonline.com·6h·
Discuss: DEV
🦠Malware Analysis
Ukraine's security agency says it killed Russian agents suspected of gunning down its officer
independent.co.uk·8h
🏗data engineering
For Algorithms, Memory Is a Far More Powerful Resource Than Time
wired.com·8h·
Discuss: Hacker News
📊Approximate Computing
Computational understanding of Li-ion batteries (2016)
nature.com·21h·
Discuss: Hacker News
⚛️Atomic Databases
SMM callout vulnerabilities identified in Gigabyte UEFI firmware
kb.cert.org·1h·
Discuss: Hacker News
🔍Memory Profilers
Refactoring 030 - How to Avoid Accidental Redundancy
hackernoon.com·6h
🔧Functional Programming
💻 Windows XP Source Code Leak — What Really Happened?
dev.to·7h·
Discuss: DEV
🏞️Delta Lake
Hiding in plain sight - Mount namespaces
haxrob.net·13h·
Discuss: Hacker News
🛡️Memory Safety
ML/AI Pipelines: The "So What" of Crypto Data Ecosystems
davanti-research.medium.com·21h·
Discuss: Hacker News
🏗data engineering
System Design Basics - Databases and Connection Pools
javarevisited.substack.com·3h·
Discuss: Substack, r/programming
⏱️Real-time Analytics
Loading...Loading more...
AboutBlogChangelogRoadmap