🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

How do CAPTCHAs Work?
corero.com·9h
⚡Proof Automation
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·2d
🔓Password Cracking
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·1h·
Discuss: DEV
🔗Data Provenance
InfoSec News Nuggets 6/24/2025
aboutdfir.com·1d
🛡Cybersecurity
Show HN: Requests-Based Google Maps Scraper
apify.com·2h·
Discuss: Hacker News
🔍BitFunnel
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.org·1d
🧠Machine Learning
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·13h
🎫Kerberos Attacks
AI Powered Honeypot
dev.to·1h·
Discuss: DEV
🦠Malware Analysis
Palo Alto Wireshark Quiz — January 2023
infosecwriteups.com·2d
📊PCAP Analysis
What Is an AI SOC Agent? What You Need to Know About the Most Strategic Operational Imperative in Cybersecurity Today
intezer.com·4h
🎯Threat Hunting
What LLMs Know About Their Users
schneier.com·11h·
Discuss: Hacker News
💻Local LLMs
How The Internet Works
dev.to·1d·
Discuss: DEV
📡Network Protocol Design
Understanding and Improving Web Security Performance
forbes.com·1d·
Discuss: Hacker News, r/devops
🌊Streaming Systems
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·1d
💿Optical Forensics
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes
dev.to·4h·
Discuss: DEV
🔌Interface Evolution
Ossification and the Internet
potaroo.net·1d·
Discuss: Hacker News
📡Network Archaeology
Canadian provider: Unpatched Cisco security vulnerability as a gateway
heise.de·1d
🌐BGP Security
Typhoon-like gang slinging TLS certificate 'signed' by the Los Angeles Police Department
theregister.com·1d
🔓Hacking
Detect Narrative Threats with AI Personas
askrally.com·2d·
Discuss: Hacker News
📡Feed Archaeology
Machine Learning Fundamentals: accuracy with python
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
Loading...Loading more...
AboutBlogChangelogRoadmap