๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Unmoved Centre - NixOS Secrets Management
unmovedcentre.comยท1d
โ„Nix
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comยท2d
๐ŸŽซKerberos Exploitation
Scattered Spider expands its roster of tactics in recent hacks
cybersecuritydive.comยท13h
๐ŸŽซKerberos Exploitation
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท3d
๐ŸŒDNS Security
A Minimal DDPM
github.comยท1dยท
Discuss: Hacker News
๐Ÿง Machine Learning
FBI Warns Parents Across America of Sinister Group Targeting Minors
newsweek.comยท13hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
What browser fingerprinting tests like Amiunique show, and what they miss
blog.castle.ioยท20hยท
Discuss: Hacker News
๐Ÿ”“Hacking
InfoSec News Nuggets 7/14/2025
aboutdfir.comยท2d
๐Ÿ”“Hacking
Over 30 AI models have been trained at 10^25 FLOP or greater
epoch.aiยท13hยท
Discuss: Hacker News
โšกPerformance Mythology
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgยท1d
๐ŸŒDNS Security
AERONET: Ensuring quality satellite data for mineral exploration
phys.orgยท1d
๐ŸŒˆSpectroscopy
A Wide Reduction Trick (2022)
words.filippo.ioยท2hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
How AI Detects Cancer in Whole Slide Images
hackernoon.comยท10h
๐Ÿง Machine Learning
Children at risk of being recruited by hostile states, police warn
bbc.comยท1d
๐ŸŽซKerberos Exploitation
Physics-Informed Linear Model (PILM): Analytical Representations and Application to Crustal Strain Rate Estimation
arxiv.orgยท1h
๐ŸŒ€Differential Geometry
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.orgยท1d
๐ŸŽฏThreat Hunting
Machine Learning Fundamentals: dimensionality reduction
dev.toยท13hยท
Discuss: DEV
๐Ÿ“Linear Algebra
Xiangqi-R1: Enhancing Spatial Strategic Reasoning in LLMs for Chinese Chess via Reinforcement Learning
arxiv.orgยท1h
๐Ÿ”ฒCellular Automata
Multimodal Coordinated Online Behavior: Trade-offs and Strategies
arxiv.orgยท1h
๐Ÿ“ŠFeed Optimization
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgยท1h
๐Ÿ•ต๏ธVector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap