๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

๏ธโ€โ™‚๏ธ Mastering OSINT: How to Find Information on Anyone
infosecwriteups.comยท2d
๐Ÿ•ณ๏ธInformation Leakage
A Practical Guide to Anomaly Detection in Python
dev.toยท3hยท
Discuss: DEV
๐Ÿง Machine Learning
The Cybersecurity Challenges Behind Your Feed
cyberthreatalliance.orgยท2d
๐Ÿ›กCybersecurity
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgยท8h
๐Ÿ”—Hash Chains
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท12hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comยท1d
๐Ÿฆ Malware Analysis
Texas sharpshooter fallacy - Wikipedia
en.m.wikipedia.orgยท52m
๐Ÿ”ฒProof Irrelevance
AERONET: Ensuring quality satellite data for mineral exploration
phys.orgยท19h
๐ŸŒˆSpectroscopy
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท7h
๐Ÿ”“Hacking
AI charging scams: Here's how you can outsmart them
techradar.comยท3h
๐Ÿฆ Malware Analysis
Porting a Cross-Disciplinary Text Mining Course Online Using Innovative Engagement Techniques
hackernoon.comยท21h
๐Ÿค–Grammar Induction
Two Types of Data Privacy Controls
cacm.acm.orgยท1d
๐Ÿ•ณ๏ธInformation Leakage
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท19h
๐ŸบZIP Archaeology
Navigating Wikipediaโ€™s Knowledge Discrepancies
diff.wikimedia.orgยท1h
๐Ÿ“ฐContent Curation
Ukraine wing of US-founded terrorist group says it was involved in killing of intelligence officer in Kyiv
theguardian.comยท2h
๐Ÿ›กCybersecurity
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.comยท1d
๐ŸงฌBitstream Evolution
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comยท18h
โ„Nix
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioยท19h
๐ŸŒŠStream Processing
How does your phone know so many private details? How thousands of apps are exploiting mysterious indoor location tracking
english.elpais.comยท1d
๐Ÿ“กBluetooth Archaeology
Wireless Airspace Defense for Modern Data Centers
bastille.netยท21h
๐Ÿ“กNetwork Monitoring
Loading...Loading more...
AboutBlogChangelogRoadmap