🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·1d·
Discuss: www.blogger.com
🎯Threat Hunting
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·8h
🔓Password Cracking
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·1h
🛡️ARM TrustZone
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack
securityaffairs.com·7h
🛡Cybersecurity
Classification in Supervised Learning: Classify Me If You Can
dev.to·4h·
Discuss: DEV
🧠Machine Learning
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blog·1h·
Discuss: Hacker News
⚡Proof Automation
Mirai-based botnet campaign "Gayfemboy" also active in Germany
heise.de·1h
🚀Indie Hacking
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·2h
🎯Threat Hunting
25th August – Threat Intelligence Report
research.checkpoint.com·3h
🔓Hacking
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
cloudsek.com·2d·
Discuss: r/linux
💣ZIP Vulnerabilities
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.com·12h
📼Cassette Hacking
Brave discovers a security flaw in Perplexity’s Comet browser
the-decoder.com·8m
🚀Indie Hacking
Code does not lie
nocomplexity.com·6h
🔒Language-based security
Ay MaMi - Analyzing a New macOS DNS Hijacker
objective-see.com·3d
🌐DNS Security
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.com·13h
🔓Hacking
Dac-Fake: A Divide and Conquer Framework for Detecting Fake News on Social Media
arxiv.org·10h
🔍BitFunnel
Tempest-LoRa: Cross-Technology Covert Communication
github.com·6h·
Discuss: Hacker News
📻Homebrew Protocols
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
hackernoon.com·9h
🔄Archival Workflows
Risky Bulletin: Hackers sabotage Iranian ships at sea, again
news.risky.biz·13h
🛡Cybersecurity
Teaching programming languages
kmjn.org·2h
💻Programming languages
Loading...Loading more...
AboutBlogChangelogRoadmap