🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔎 OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Tsunami alert lifted after powerful quakes off Russian coast
japantimes.co.jp·12h
📰SGML
Astronomers capture dawn of new solar system for 1st time
dw.com·12h
🦴Database Paleontology
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.com·3d
🔐Cryptographic Archaeology
Death to Bullshit
deathtobullshit.com·1d
📰Content Curation
New Russian Law Criminalizes Online Searches For Controversial Content
yro.slashdot.org·2d
🛡️Security Headers
A platform that discovers the latest and most innovative SaaS products
saashunt.best·9h·
Discuss: Hacker News
📡RSS Automation
Lammy announces exposure of 18 Russian spies after UK cyber-attacks
theguardian.com·1d
🇷🇺Russian Computing
Super Resolution for Renewable Energy Resource Data With Wind From Reanalysis Data and Application to Ukraine
arxiv.org·2d
📰RSS Archaeology
RGB Pre-Training Enhanced Unobservable Feature Latent Diffusion Model for Spectral Reconstruction
arxiv.org·2d
🧠Machine Learning
What's an ORM? (Your Database Translator!) 🗣️
dev.to·19h·
Discuss: DEV
🗄️Database Internals
Improving Drug Identification in Overdose Death Surveillance using Large Language Models
arxiv.org·2d
🧠Machine Learning
Gain a Better Understanding of Computer Vision: Dynamic SOLO (SOLOv2) with TensorFlow
towardsdatascience.com·1d
📊Learned Metrics
Russian infostealer sends commands to public LLM to craft requests on the fly
bleepingcomputer.com·1d·
Discuss: Hacker News
🦠Malware Analysis
Advanced PDF Optimization Techniques - 1752936
dev.to·21h·
Discuss: DEV
📝Text Compression
Intelligent Virtual Sonographer (IVS): Enhancing Physician-Robot-Patient Communication
arxiv.org·2d
🎙️Whisper
How TV Shows Like ‘The X-Files’ Trained Us to Be Conspiracy Theorists
nytimes.com·17h
🧲Magnetic Philosophy
“$ The Art of Smart Recon: How I Found 10+ Vulnerabilities Without Firing a Single Exploit”
infosecwriteups.com·23h
🔓Hacking
Complete 11+ Hour Python Course for Beginners
dev.to·4h·
Discuss: DEV
🎵Audio ML
Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)
securityaffairs.com·3d
🔓Hacking
OCC 2025 - Protoweb and Browservice web proxies
82mhz.net·1d
🕸️WASM Archives
Loading...Loading more...
AboutBlogChangelogRoadmap