๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท21mยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Machine Learning Fundamentals: decision trees project
dev.toยท8hยท
Discuss: DEV
๐Ÿ”—Topological Sorting
Oxygen Tech Bytes in June 2025
forensicfocus.comยท1d
๐Ÿ”Audio Forensics
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท5h
โš–๏ธLegal Compliance
Silent network authentication: What fraud teams need to know
fingerprint.comยท3h
๐ŸŽฏThreat Hunting
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.comยท12h
๐Ÿ“กBGP Archaeology
Trace Every Identity Action with Teleport Identity Security
goteleport.comยท1d
๐Ÿ”—Data Provenance
Wireshark Made Me See the Internet Differently
infosecwriteups.comยท1d
๐Ÿ“กNetwork Monitoring
Triggering QUIC
potaroo.netยท18h
๐ŸŒDNS over QUIC
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท1d
๐Ÿ”NTLM Archaeology
Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others
cyberscoop.comยท1h
๐Ÿ”“Hacking
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.infoยท2dยท
Discuss: r/programming
๐ŸšจIncident Response
The internet still runs on 1980s protocols โ€“ that should worry you
techradar.comยท13h
๐Ÿ“กBGP Archaeology
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.devยท15hยท
Discuss: Lobsters, Hacker News
๐ŸŒNetwork Protocols
NEWS ROUNDUP โ€“ 14th July 2025
digitalforensicsmagazine.comยท1d
๐Ÿ”NTLM Forensics
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.comยท8h
๐ŸคConsensus Algorithms
Wireless Airspace Defense for Modern Data Centers
bastille.netยท9h
๐Ÿ“กNetwork Monitoring
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comยท11h
๐Ÿฆ Malware Analysis
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioยท7h
๐ŸŒŠStream Processing
Week 28 โ€“ 2025
thisweekin4n6.comยท2d
๐ŸบKerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap