🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Applying AI Analysis to PDF Threats
blog.virustotal.com·8h·
Discuss: blog.virustotal.com
🔍Binary Forensics
JNI Obfuscation, Reverse Engineering, and Android Security
hackernoon.com·13h
🎮Game Decompilation
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·18h
🔓Password Cracking
Malicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware
securityaffairs.com·6h
🔍BitFunnel
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.com·2h
🎯Threat Hunting
A Bitcoin Core Code Analysis
binaryigor.com·9h·
Discuss: Hacker News
🧬Bitstream Evolution
What is SAST and DAST? Key Differences Explained
boostsecurity.io·9h
🕵️Penetration Testing
Mirai-based botnet campaign "Gayfemboy" also active in Germany
heise.de·11h
🚀Indie Hacking
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·11h
🛡️ARM TrustZone
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.com·10h
👁️Observatory Systems
Classification in Supervised Learning: Classify Me If You Can
dev.to·15h·
Discuss: DEV
🧠Machine Learning
25th August – Threat Intelligence Report
research.checkpoint.com·13h
🔓Hacking
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·10h
🛡Cybersecurity
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·12h
🎯Threat Hunting
Claude Code's 19 cent Parser
blogger.com·11h
🔧Binary Parsers
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.com·2h·
Discuss: Hacker News
🕵️Vector Smuggling
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.com·22h
📼Cassette Hacking
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
cloudsek.com·2d·
Discuss: r/linux
💣ZIP Vulnerabilities
Brave discovers a security flaw in Perplexity’s Comet browser
the-decoder.com·10h
🚀Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap