🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

**High-Performance Packet Processing: Combining eBPF, XDP, and Go for Million-Packet-Per-Second Throughput**
dev.to·8h·
Discuss: DEV
🛡️eBPF Programs
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·15h
🎯Threat Hunting
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·1d·
Discuss: Hacker News
🌐Network Security
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.com·5h
🎯Threat Hunting
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
25th August – Threat Intelligence Report
research.checkpoint.com·16h
🔓Hacking
Claude Code's 19 cent Parser
blogger.com·14h
🔧Binary Parsers
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.com·13h
🔒Language-based security
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·13h
🎯Threat Hunting
Fremont woman got out of the shower and came face-to-face with iPhone camera
mercurynews.com·10h
🚨Incident Response
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.com·1d
🔓Hacking
InfoSec News Nuggets 8/25/2025
aboutdfir.com·14h
🔓Hacking
Can I possibly get some help with this design?
reddit.com·8h·
Discuss: r/homelab
🛣️BGP Hijacking
Wavelet-Enhanced PaDiM for Industrial Anomaly Detection
arxiv.org·23h
🧠Machine Learning
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·12h·
Discuss: Hacker News
🌳Archive Merkle Trees
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·13h
🛡Cybersecurity
Episode 100
reloadin.net·8h·
Discuss: Hacker News
📡Network Protocol Design
Tempest-LoRa: Cross-Technology Covert Communication
github.com·19h·
Discuss: Hacker News
📻Homebrew Protocols
Go module for brute force attacks on SSH steals the accesses found
heise.de·17h
🛣️BGP Hijacking
Improving Search for Deep Research Agents
vishnudut.com·6h·
Discuss: Hacker News
🧠Query Planners
Loading...Loading more...
AboutBlogChangelogRoadmap