🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”— Binary Similarity

Code Fingerprinting, Malware Analysis, Function Comparison, Reverse Engineering

Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
intezer.comΒ·6h
πŸ”“Hacking
Dimensionally Reduced Open-World Clustering: DROWCULA
arxiv.orgΒ·22h
πŸ—‚οΈVector Databases
humanely dealing with humungus crawlers
flak.tedunangst.comΒ·9h
🐧FOSS
Binary Patching: A Complete Step-by-Step Guide
infosecwriteups.comΒ·1d
🦠Malware Analysis
Why feature selection methods rarely agree (I tested five side by side)
aayushig950.substack.comΒ·14hΒ·
Discuss: Substack
🧠Machine Learning
Notes of cyber inspector: three clusters of threat in cyberspace
securelist.comΒ·12h
πŸ•΅οΈPenetration Testing
Attackers hijacked popular NPM packages to replace crypto wallet addresses
exaforce.comΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Product comparison: Detectify vs. Intruder
blog.detectify.comΒ·12h
πŸ•΅οΈPenetration Testing
Digital Forensics Round-Up, September 10 2025
forensicfocus.comΒ·11h
βš–οΈDigital Evidence
Why sandboxing matters now β€” and how to choose one that gives you facts, not fiction
vmray.comΒ·18h
πŸ”’WASM Capabilities
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.toΒ·9hΒ·
Discuss: DEV
πŸ›‘οΈWASM Security
Continuous Improvement in LLM Code Generation
blogger.comΒ·13h
βš”οΈLean Tactics
When Dependencies Turn Dangerous: Responding to the NPM Supply Chain Attack
blog.qualys.comΒ·5h
πŸ”—Supply Chain
Into the Deep DNS Sea with the JSCEAL Campaign
circleid.comΒ·9h
πŸ“‘DNS Archaeology
ChillyHell: A Deep Dive into a Modular macOS Backdoor
jamf.comΒ·15h
πŸ“ŸTerminal Forensics
Detection Engineering: Practicing Detection-as-Code – Versioning – Part 5
blog.nviso.euΒ·1d
βœ…Archive Validation
Reverse Engineering a Robot Mower’s Fence
hackaday.comΒ·36m
πŸ”“Reverse engineering
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioΒ·3h
πŸ”’Secure Boot
Crypto wallets targeted in widespread hack of open-source repos
reversinglabs.comΒ·1d
🎫Kerberos Attacks
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.comΒ·8hΒ·
Discuss: Hacker News
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap