🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Wagnsson, Charlotte, - Russian political language and public opinion on the West, NATO and Chechnya : securitisation theory reconsidered / Charlotte Wagnsson.
libris.kb.seΒ·1d
πŸ‡ΈπŸ‡ͺNordic Cryptography
Worth Reading 062425
rule11.techΒ·7h
🌐DNS over QUIC
Program Execution, follow-up
windowsir.blogspot.comΒ·10hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Book review: Surveillance & privacy
technologyreview.comΒ·2d
🧲Magnetic Philosophy
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·8h
πŸ•΅οΈPenetration Testing
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comΒ·9h
🦠Malware Analysis
Don't Read This If You Have a Security Clearance (2023)
theatlantic.comΒ·3dΒ·
Discuss: Hacker News
πŸ•³οΈInformation Leakage
China unveils tiny terrifying mosquito-sized drone to be used for spying
the-sun.comΒ·6hΒ·
Discuss: Hacker News
πŸ•΅οΈVector Smuggling
Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toΒ·15hΒ·
Discuss: DEV
⛏️Archive Mining
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.comΒ·15h
🎯Threat Hunting
Divine Provenance
asimov.blogΒ·3hΒ·
Discuss: Hacker News
🧲Magnetic Philosophy
Exploiting the Human Layer: Scattered Spider’s Identity-Centric Attack Chain (2022–2025)
research.kudelskisecurity.comΒ·2d
🎯Threat Hunting
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·1d
πŸ”—Data Provenance
Networking for Systems Administrators
mwl.ioΒ·9hΒ·
Discuss: Hacker News
🌐DNS over QUIC
Show HN: Laburity – Dark and Deep Web Monitoring
laburity.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Recent Trends in Artificial Intelligence Technology: A Scoping Review
arxiv.orgΒ·1d
🧠Intelligence Compression
Machine Learning Fundamentals: active learning with python
dev.toΒ·5hΒ·
Discuss: DEV
🧠Machine Learning
Granular-Ball-Induced Multiple Kernel K-Means
arxiv.orgΒ·1d
πŸŒ€Differential Geometry
Small language model for secrets detection
wiz.ioΒ·2dΒ·
Discuss: Hacker News
πŸ’»Local LLMs
DRIFT: Data Reduction via Informative Feature Transformation- Generalization Begins Before Deep Learning starts
arxiv.orgΒ·18h
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap