๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.orgยท6h
๐ŸŽฏThreat Hunting
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.devยท1dยท
Discuss: Lobsters, Hacker News
๐ŸŒNetwork Protocols
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท16h
โš–๏ธLegal Compliance
Oxygen Tech Bytes in June 2025
forensicfocus.comยท1d
๐Ÿ”Audio Forensics
Silent network authentication: What fraud teams need to know
fingerprint.comยท14h
๐ŸŽฏThreat Hunting
Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation
darknet.org.ukยท9h
๐Ÿฆ Malware Analysis
Trace Every Identity Action with Teleport Identity Security
goteleport.comยท1d
๐Ÿ”—Data Provenance
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.comยท22h
๐Ÿ“กBGP Archaeology
Wireshark Made Me See the Internet Differently
infosecwriteups.comยท1d
๐Ÿ“กNetwork Monitoring
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.comยท18h
๐ŸคConsensus Algorithms
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท11hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Checking data integrity
eclecticlight.coยท4h
โœ…Checksum Validation
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท2d
๐Ÿ”NTLM Archaeology
The internet still runs on 1980s protocols โ€“ that should worry you
techradar.comยท1d
๐Ÿ“กBGP Archaeology
Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others
cyberscoop.comยท12h
๐Ÿ”“Hacking
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioยท17h
๐ŸŒŠStream Processing
Triggering QUIC
potaroo.netยท1d
๐ŸŒDNS over QUIC
NEWS ROUNDUP โ€“ 14th July 2025
digitalforensicsmagazine.comยท1d
๐Ÿ”NTLM Forensics
A Practical Guide to Anomaly Detection in Python
dev.toยท2hยท
Discuss: DEV
๐Ÿง Machine Learning
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.infoยท2dยท
Discuss: r/programming
๐ŸšจIncident Response
Loading...Loading more...
AboutBlogChangelogRoadmap