🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔎 OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

️‍♂️ Mastering OSINT: How to Find Information on Anyone
infosecwriteups.com·2d
🕳️Information Leakage
A Practical Guide to Anomaly Detection in Python
dev.to·19h·
Discuss: DEV
🧠Machine Learning
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·14h
📡Bluetooth Archaeology
Intent, Not Tools, Defines the Discipline
brettshavers.com·6h
🕳️Information Leakage
Revisiting k-Means: 3 Approaches to Make It Work Better
machinelearningmastery.com·13h
📊Vector Quantization
Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)
securityaffairs.com·8h
🔓Hacking
Study finds elites' offshore asset strategies shaped by home country governance
phys.org·9h
🔗Data Provenance
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.org·23h
🔗Hash Chains
The Cybersecurity Challenges Behind Your Feed
cyberthreatalliance.org·2d
🛡Cybersecurity
AtCoder Finals Problem Statement
atcoder.jp·10h·
Discuss: Hacker News
🇯🇵Japanese Computing
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·13h
🔓Password Cracking
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.com·2d
🦠Malware Analysis
Vulnerability Scanning with Nmap
blackhillsinfosec.com·13h
🎯NTLM Attacks
Jaya Klara Brekke: ‘Know who runs your infrastructure’
blog.okfn.org·7h
🌐Network Security
Salt Typhoon 'extensively' compromised a state national guard network for months
metacurity.com·13h
🛡Cybersecurity
Inside the Ethical Hacker’s Mind: How Pros Make Split-Second Security Decisions
oreilly.com·11h
🔓Hacking
Texas sharpshooter fallacy - Wikipedia
en.m.wikipedia.org·16h
🔲Proof Irrelevance
AI charging scams: Here's how you can outsmart them
techradar.com·18h
🦠Malware Analysis
Porting a Cross-Disciplinary Text Mining Course Online Using Innovative Engagement Techniques
hackernoon.com·1d
🤖Grammar Induction
Two Types of Data Privacy Controls
cacm.acm.org·2d
🕳️Information Leakage
Loading...Loading more...
AboutBlogChangelogRoadmap