🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

How I Approach Performance Investigations – By Rico Mariani
ricomariani.medium.com·1d·
Discuss: Hacker News
🎯Performance Forensics
The Cartel Supercomputer of 1994
vice.com·7h·
Discuss: Hacker News
📼Cassette Hacking
RomCom and TransferLoader IoCs in the Spotlight
circleid.com·12h
📡DNS Archaeology
Self-Healing Network of Interconnected Edge Devices Empowered by Infrastructure-as-Code and LoRa Communication
arxiv.org·23h
🕸️Mesh Networking
Saleae Analyzer for the BDM protocol
zetier.com·5d
🔬Binary Analysis
Insights: Telling You What We Really Think
unit42.paloaltonetworks.com·9h
🎯Threat Hunting
Fixing my Old OS Assignment with Machine Code Hacks
gridbugs.org·12h·
Discuss: r/programming
📟Terminal Forensics
Supervised Learning: A Focus on Classification
dev.to·22h·
Discuss: DEV
🧠Machine Learning
OpenBSD Hackathon Leipzig 2025: Qt6 Fixes, KDE PIM, and C++26 Updates
discoverbsd.com·19h
🔍eBPF
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·7h·
Discuss: Hacker News
✅Format Validation
7 Steps to Mastering No Code Automation with n8n for Data Professionals
kdnuggets.com·15h
🌊Stream Processing
When Switches Flood LLDP Traffic
blog.ipspace.net·20h·
Discuss: Hacker News
📡Network Protocol Design
The Limits of NTP Accuracy on Linux
scottstuff.net·13h·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🎯Emulation Accuracy
Certificate Transparency - Part 3 - Operations
ipng.ch·1d
🔒Hardware Attestation
Canary Deployment and Traffic Shifting with Kubernetes and Istio
blog.devops.dev·13h
📡Network Monitoring
Day 11: AI Analyzer Foundation Complete - Model Selection and Evidence Formatting
dev.to·9h·
Discuss: DEV
👁️System Observability
Internet Access Providers Aren't Bound by DMCA Unmasking Subpoenas–In Re Cox
blog.ericgoldman.org·1d·
Discuss: Hacker News
🏴‍☠️Piracy
Bmssp: A New Shortest Path Algorithm
rohanparanjpe.substack.com·8h·
Discuss: Substack
🔗Topological Sorting
Adaptive DDoS Mitigation via Hyper-Dimensional Signature Correlation & Dynamic Recursion
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.com·5h·
Discuss: Hacker News
🕵️Vector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap