🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“‘ Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·14hΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Time-Optimal Directed q-Analysis
arxiv.orgΒ·1d
🎯Performance Proofs
Saleae Analyzer for the BDM protocol
zetier.comΒ·2d
πŸ”¬Binary Analysis
Micropycelium - prototype routable mesh network for ESP32
hackster.ioΒ·21h
πŸ•ΈοΈMesh Networking
Get Back To WARP
binary.ninjaΒ·13h
πŸ§ͺBinary Fuzzing
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
portswigger.netΒ·3d
πŸ›£οΈBGP Hijacking
Digital Forensics Round-Up, August 20 2025
forensicfocus.comΒ·2d
πŸ“ŸTerminal Forensics
Modern vehicle cybersecurity trends
securelist.comΒ·21h
πŸ”ŒOperating system internals
Making RFCs easier to find and use through a re-imagined RFC Editor website
ietf.orgΒ·1d
πŸ“ABNF Parsing
MoQ: Refactoring the Internet's real-time media stack
blog.cloudflare.comΒ·16hΒ·
Discuss: Hacker News
πŸ“žWebRTC
The ABCs of β€œβ€‘ishing”: From Phishing to Quishing
bitsight.comΒ·1d
🎯Threat Hunting
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comΒ·1d
🌐DNS Security
Darknet Communications in 2025 – From IRC Forums to Telegram Crime Networks
darknet.org.ukΒ·3d
πŸ§…Tor Networks
Back to the 90s on Real Hardware
hackaday.comΒ·1h
πŸ•ΉοΈRetro Gaming
US military wants to secure the internet by making it more quantum
newscientist.comΒ·13h
βš›οΈQuantum Tape
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.comΒ·1d
πŸ•΅οΈPenetration Testing
How HackerOne Uses AI to Triage, Prioritize, and Validate Code Scanner Findings at Scale
hackerone.comΒ·1d
⚑Proof Automation
Analyzing CrossRAT
objective-see.comΒ·1d
πŸ›£οΈBGP Hijacking
Wireguard on Android – A Bit of a Mixed Bag
blog.wirelessmoves.comΒ·58m
🏺ZIP Archaeology
Is a new privacy protocol helping malicious actors more than Internet users?
techradar.comΒ·1d
πŸ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap