🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔎 OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Computer-vision research powers surveillance technology
nature.com·2h
🎯Threat Hunting
How to Build an OPSEC Culture in Your Organization
securityscorecard.com·2h
🎯Threat Hunting
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·4h·
Discuss: DEV
🧠Machine Learning
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.net·4h·
Discuss: Hacker News
🏺Kerberos Archaeology
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·10h
🦠Malware Analysis
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·3h
🎯Threat Hunting
Iranian Threat Actor Profile
cstromblad.com·23h
🔒WASM Capabilities
Killing machines: how Russia and Ukraine’s race to perfect deadly pilotless drones could harm us all
theguardian.com·9h
🇷🇺Soviet Computing
Unsupervised Learning NO. 486
newsletter.danielmiessler.com·1d
🕵️Vector Smuggling
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·9h
🎫Kerberos Attacks
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·1d
💿Optical Forensics
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·1d
⚔️Lean Tactics
How the US Military Is Redefining Zero Trust
darkreading.com·1d
🌐Network Security
The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers
dev.to·3d·
Discuss: DEV
🚨Incident Response
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·6h
🦠Malware Analysis
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·20h
🎫Kerberos Exploitation
Secret FSB documents confirm Iran and Russia are in a spy war against each other
theins.press·42m·
Discuss: Hacker News
🕵Intelligence
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·3h
🎯Threat Hunting
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·1d
🔓Password Cracking
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap