Feeds to Scour
SubscribedAll
Scoured 15555 posts in 730.8 ms
Techniques of Modern Attacks
arxiv.org·1d
🎯Threat Hunting
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.com·19h·
Discuss: Hacker News
🌐WARC Forensics
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·20h
📊Static Analysis
Preview
Report Post
Ghost in the Wi-Fi
josephmate.github.io·1d
📡Network Monitoring
Preview
Report Post
[Podcast] NITK Students at IETF: Fresh minds for standards development
blog.apnic.net·11h
📝ABNF Parsing
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·15h
🔍Audio Forensics
Preview
Report Post
What is OSINT?
medium.com·1d
🔎OSINT Techniques
Preview
Report Post
On MPLS Paths, Tunnels and Interfaces
blog.ipspace.net·2d
📡Network Protocol Design
Preview
Report Post
Cyber Is What We Make of It
buttondown.com·16h
🛡Cybersecurity
Preview
Report Post
AI Agents vs. Human Investigators: Balancing Automation, Security, and Expertise in Cyber Forensic Analysis
arxiv.org·3h
🏢LDAP Forensics
Preview
Report Post
a transport layer for agentic apps
ably.com·10h·
Discuss: Hacker News
🌊Streaming Systems
Preview
Report Post
LABScon25 Replay | How to Bug Hotel Rooms v2.0
sentinelone.com·18h
🏠Homelab Pentesting
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·15h
🎯Threat Hunting
Preview
Report Post
Spoofing on Polymarket
rajivsethi.substack.com·10h·
Discuss: Substack
🔍BitFunnel
Preview
Report Post
CCIE automation
forums.anandtech.com·1d
🏠Homelab Automation
Preview
Report Post
Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems
securityaffairs.com·1d
🔓Hacking
Preview
Report Post
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Deep Dive into VCP v1.1
dev.to·2d·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·1h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
·17h
🎯Threat Hunting
Preview
Report Post
network library for C/C++
mongoose.ws·22h·
Discuss: Hacker News
🌐NetworkProtocols
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help