๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Proximity Audio/Video Technology
thegamer.comยท1dยท
Discuss: Hacker News
๐ŸบGaming Archaeology
Build Privacy Tools, Go to Prison, Samourai Developers Change Pleas
sambent.comยท23hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
The Ghost in the Graph, Pt. 1: How Beliefs Become Organizational Behavior
vasily.ccยท2dยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
Police and sharks:not knowing how your data is processed can lead you astray
blog.engora.comยท4dยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
What Makes a Mature Science
press.asimov.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Partner with the AI, throw away the code
martinfowler.comยท1d
๐Ÿฆ€Rust Macros
Sleuths and scientific institutions are not rivals
nature.comยท3d
๐Ÿ”Tape Forensics
Donald Trump must put himself at the forefront of peace-building
the-independent.comยท1d
๐Ÿ“ABNF Parsing
Letters: Bay Area residents should prepare a smoke safety plan
mercurynews.comยท12h
๐Ÿ’ปLocal first
Top Tools for Enterprise Data Analytics on Snowflake
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Archive Automation
Meejah/shwim: Peer-to-peer terminal sharing
github.comยท4hยท
Discuss: Hacker News
๐Ÿ“ŸTerminals
Predicting Maintenance Cessation of Open Source Software Repositories with An Integrated Feature Framework
arxiv.orgยท3d
๐Ÿ”—Topological Sorting
Mastering Nmap: The Ultimate Guide to Port Scanning
infosecwriteups.comยท4d
๐Ÿ•ต๏ธDomain Enumeration
AI's Bold Future in Cybersecurity Threats
dev.toยท6dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy
arxiv.orgยท4d
๐Ÿ’ปLocal LLMs
Ethical Classification of Non-Coding Contributions in Open-Source Projects via Large Language Models
arxiv.orgยท3d
๐Ÿ”“Open Source Software
How I Got a Free OSCP Exam Directly from OffSec
infosecwriteups.comยท5d
๐Ÿ“ŸTerminal Forensics
Dark Reading Confidential: Funding the CVE Program of the Future
darkreading.comยท1d
โœ…Archive Fixity
InterfO-RAN: Real-Time In-band Cellular Uplink Interference Detection with GPU-Accelerated dApps
arxiv.orgยท1d
๐Ÿ“ŠPCAP Analysis
FovEx: Human-Inspired Explanations for Vision Transformers and Convolutional Neural Networks
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap