๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Binary Similarity

Code Fingerprinting, Malware Analysis, Function Comparison, Reverse Engineering

Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
intezer.comยท9h
๐Ÿ”“Hacking
Contributions to Robust and Efficient Methods for Analysis of High Dimensional Data
arxiv.orgยท1h
๐Ÿง Machine Learning
humanely dealing with humungus crawlers
flak.tedunangst.comยท13h
๐ŸงFOSS
Binary Patching: A Complete Step-by-Step Guide
infosecwriteups.comยท2d
๐Ÿฆ Malware Analysis
Notes of cyber inspector: three clusters of threat in cyberspace
securelist.comยท15h
๐Ÿ•ต๏ธPenetration Testing
Attackers hijacked popular NPM packages to replace crypto wallet addresses
exaforce.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Product comparison: Detectify vs. Intruder
blog.detectify.comยท16h
๐Ÿ•ต๏ธPenetration Testing
Digital Forensics Round-Up, September 10 2025
forensicfocus.comยท14h
โš–๏ธDigital Evidence
Why sandboxing matters now โ€” and how to choose one that gives you facts, not fiction
vmray.comยท21h
๐Ÿ”’WASM Capabilities
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.toยท12hยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Continuous Improvement in LLM Code Generation
blogger.comยท16h
โš”๏ธLean Tactics
When Dependencies Turn Dangerous: Responding to the NPM Supply Chain Attack
blog.qualys.comยท9h
๐Ÿ”—Supply Chain
Why feature selection methods rarely agree (I tested five side by side)
aayushig950.substack.comยท18hยท
Discuss: Substack
๐Ÿง Machine Learning
ChillyHell: A Deep Dive into a Modular macOS Backdoor
jamf.comยท18h
๐Ÿ“ŸTerminal Forensics
Into the Deep DNS Sea with the JSCEAL Campaign
circleid.comยท13h
๐Ÿ“กDNS Archaeology
Detection Engineering: Practicing Detection-as-Code โ€“ Versioning โ€“ Part 5
blog.nviso.euยท1d
โœ…Archive Validation
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioยท6h
๐Ÿ”’Secure Boot
Crypto wallets targeted in widespread hack of open-source repos
reversinglabs.comยท1d
๐ŸŽซKerberos Attacks
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.comยท11hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Automated Semantic Disentanglement of Hierarchical Visual Features for Pattern Recognition
dev.toยท6hยท
Discuss: DEV
๐Ÿค–Advanced OCR
Loading...Loading more...
AboutBlogChangelogRoadmap