🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·9h
🎯Threat Hunting
**High-Performance Packet Processing: Combining eBPF, XDP, and Go for Million-Packet-Per-Second Throughput**
dev.to·3h·
Discuss: DEV
🛡️eBPF Programs
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·1d·
Discuss: Hacker News
🌐Network Security
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
InfoSec News Nuggets 8/25/2025
aboutdfir.com·9h
🔓Hacking
Claude Code's 19 cent Parser
blogger.com·9h
🔧Binary Parsers
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·7h
🎯Threat Hunting
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.com·8h
🔒Language-based security
Can I possibly get some help with this design?
reddit.com·3h·
Discuss: r/homelab
🛣️BGP Hijacking
The Limits of NTP Accuracy on Linux
scottstuff.net·8h·
Discuss: Lobsters, Hacker News
🎯Emulation Accuracy
Wavelet-Enhanced PaDiM for Industrial Anomaly Detection
arxiv.org·18h
🧠Machine Learning
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·7h·
Discuss: Hacker News
🌳Archive Merkle Trees
25th August – Threat Intelligence Report
research.checkpoint.com·11h
🔓Hacking
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·8h
🛡Cybersecurity
Fremont woman got out of the shower and came face-to-face with iPhone camera
mercurynews.com·5h
🚨Incident Response
Episode 100
reloadin.net·2h·
Discuss: Hacker News
📡Network Protocol Design
Tempest-LoRa: Cross-Technology Covert Communication
github.com·13h·
Discuss: Hacker News
📻Homebrew Protocols
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.com·21h
🔓Hacking
Go module for brute force attacks on SSH steals the accesses found
heise.de·11h
🛣️BGP Hijacking
Improving Search for Deep Research Agents
vishnudut.com·53m·
Discuss: Hacker News
🧠Query Planners
Loading...Loading more...
AboutBlogChangelogRoadmap