🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Applying AI Analysis to PDF Threats
blog.virustotal.com·6h·
Discuss: blog.virustotal.com
🔍Binary Forensics
JNI Obfuscation, Reverse Engineering, and Android Security
hackernoon.com·10h
🎮Game Decompilation
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·16h
🔓Password Cracking
Malicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware
securityaffairs.com·4h
🔍BitFunnel
A Bitcoin Core Code Analysis
binaryigor.com·6h·
Discuss: Hacker News
🧬Bitstream Evolution
What is SAST and DAST? Key Differences Explained
boostsecurity.io·7h
🕵️Penetration Testing
Mirai-based botnet campaign "Gayfemboy" also active in Germany
heise.de·9h
🚀Indie Hacking
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·9h
🛡️ARM TrustZone
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.com·8h
👁️Observatory Systems
Classification in Supervised Learning: Classify Me If You Can
dev.to·12h·
Discuss: DEV
🧠Machine Learning
25th August – Threat Intelligence Report
research.checkpoint.com·11h
🔓Hacking
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·8h
🛡Cybersecurity
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·10h
🎯Threat Hunting
Claude Code's 19 cent Parser
blogger.com·9h
🔧Binary Parsers
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.com·34m·
Discuss: Hacker News
🕵️Vector Smuggling
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.com·20h
📼Cassette Hacking
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
cloudsek.com·2d·
Discuss: r/linux
💣ZIP Vulnerabilities
Brave discovers a security flaw in Perplexity’s Comet browser
the-decoder.com·8h
🚀Indie Hacking
Code does not lie
nocomplexity.com·14h
🔒Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap