Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Ransomware, Trojans, Dynamic Analysis, Sandbox Testing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112656
posts in
733.9
ms
CySecurity
News - Latest Information Security and Hacking Incidents: Researchers Identify Previously Undocumented Malware Used in World Leaks
Intrusions
cysecurity.news
·
2h
·
Discuss:
Blogger
🦈
Wireshark
Show HN:
Azazel
– Lightweight
eBPF-based
malware analysis sandbox using Docker
github.com
·
1h
·
Discuss:
Hacker News
💣
Metasploit
How AI Code Review Tools Are
Catching
Bugs
That Humans Miss
thepulsegazette.com
·
19h
·
Discuss:
DEV
📝
Regex
AgentRE-Bench
: Can LLM Agents Reverse Engineer Malware?
agentre-bench.ai
·
17h
·
Discuss:
Hacker News
💣
Metasploit
Unzipping
the Threat: How to Block Malware Hidden in Password-Protected
ZIP
Files
blog.checkpoint.com
·
1d
🕸️
Burp Suite
Safeguarding the Practice of OSINT through
Schelerian
Sociology
medium.com
·
2h
🕵️
OSINT
Event
Analytic
Tools
trendhunter.com
·
7h
📝
Regex
SecureScan
: An AI-Driven Multi-Layer Framework for Malware and Phishing Detection Using
Logistic
Regression and Threat Intelligence Integration
arxiv.org
·
2d
🔍
Reverse Engineering
0APT
RANSOMWARE
: The Real FAKE!
rakeshkrish.medium.com
·
6h
💣
Metasploit
Application
Security
dev.to
·
1d
·
Discuss:
DEV
💣
Metasploit
taoq-ai/ziran
:
Ziran
uses advanced attack methodologies including multi-phase trust exploitation and knowledge graph analysis to uncover vulnerabilities in AI agents before attackers do.
github.com
·
1d
·
Discuss:
Hacker News
💣
Metasploit
REMnux
8 Linux
Toolkit
for Malware Analysis Is Out to Celebrate 15th Anniversary
9to5linux.com
·
3h
🔍
Reverse Engineering
Suspected Russian hackers deploy
CANFAIL
malware
against Ukraine
securityaffairs.com
·
9h
🌐
Web Exploits
I stopped
relying
on my
antivirus
and started using these behavior-monitoring tools instead
makeuseof.com
·
1d
🦈
Wireshark
Android
malware
hidden in fake
antivirus
app
foxnews.com
·
1h
💣
Metasploit
Tracing a threat actor's
footprints
on
Tor
sprocketsecurity.com
·
1d
·
Discuss:
Hacker News
,
r/privacy
🦈
Wireshark
Fake job
recruiters
hide
malware in developer coding challenges
bleepingcomputer.com
·
21h
💣
Metasploit
How we
allowed
remote code execution (but
safely
)
tumuchdata.club
·
1d
·
Discuss:
Lobsters
,
Hacker News
🐍
Hacking, automation, python, black hat hacking
Malware
or
Virus
?
forums.anandtech.com
·
2d
🔍
Reverse Engineering
I Built a Chrome Extension That
Scans
Websites
for Threats Using AI
dev.to
·
10h
·
Discuss:
DEV
🕸️
Burp Suite
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help