🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Inferno Part 2: Let's Make a Cluster
debu.gs·22h·
Discuss: Hacker News
🏠HomeLab
Normalisation of SWIFT Message Counterparties with Feature Extraction and Clustering
arxiv.org·1d
⚙️ABNF Mining
Book Review: "The Language of Deception"
lockboxx.blogspot.com·1d·
Discuss: www.blogger.com
📼Cassette Hacking
ICS-OT-PLC CTF Challenge Write-Up: Solving the CISS2025 Stage-1 “Pass the Door of Durin”
pixelstech.net·5h
🎯Interactive Provers
In the rush to adopt hot new tech, security is often forgotten. AI is no exception
theregister.com·3h·
Discuss: Hacker News
🛣️BGP Hijacking
Three Lazarus RATs coming for your cheese
blog.fox-it.com·19h
🎫Kerberos Exploitation
Governance of the DNS root zone
blog.apnic.net·7h
🌐DNS over QUIC
Introduction: Ethics and Intelligence
tandfonline.com·21h
🕵Intelligence
Implementing A Minimal SSH Server in Go
dev.to·3h·
Discuss: DEV
🌐Protocol Synthesis
Using Torrent on FreeBSD: Setup, Ethics, and Tools
discoverbsd.com·18h
🐡OpenBSD
College Dormitory Capstone Project: The Commonality Lab
commonalitylab.com·21h·
Discuss: r/homelab
🏠Homelab Pentesting
A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years, (Tue, Sep 2nd)
isc.sans.edu·2h
🎫Kerberos Attacks
Show HN: ExeTrace – introducing executable drift monitoring (EDM)
sites.google.com·19h·
Discuss: Hacker News
📟Terminal Forensics
Nix Vegas 2025 Retrospective
nix.vegas·12h·
Discuss: Lobsters
📻Homebrew Protocols
The resilient retailer’s guide to proactive cyber defense
techradar.com·1h
🛡Cybersecurity
How to Discover the Binary System as a Child • Simon Peyton Jones & Chelsea Troy • GOTO 2025
youtube.com·20h
⚔️Lean Tactics
Detecting Exposed LLM Servers: A Shodan Case Study on Ollama
blogs.cisco.com·20h
📦Container Security
Ransomware artifacts
windowsir.blogspot.com·18h·
Discuss: www.blogger.com
🎫Kerberos Exploitation
1st September – Threat Intelligence Report
research.checkpoint.com·20h
🔓Hacking
A new attack reshapes the rules of Bitcoin mining
techxplore.com·18h·
Discuss: Hacker News
🔗Hash Chains
Loading...Loading more...
AboutBlogChangelogRoadmap