🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Europol mapped a criminal network by analyzing encrypted comms - and then seized an entire hotel while busting a multi-million euro laundering ring
techradar.com·7h
🕵️Vector Smuggling
Decentralized Proof-of-Location systems for trust, scalability, and privacy
nature.com·1d·
Discuss: Hacker News
🤝Distributed Consensus
The Wireless Airspace Threat to Operational Technology Networks
bastille.net·5h
📡Network Monitoring
Let Me Preface That…
systemsapproach.org·1d
🌐BGP Security
MCP vs A2A - A Complete Deep Dive
hackernoon.com·2d
🔌Interface Evolution
It's the certificates, stupid!
reverse.put.as·21h
🏺Kerberos Archaeology
6 Things I Learned While Building an Incident Response Simulation (IR Sim 101)
infosecwriteups.com·1d
🎯Threat Hunting
Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators
forensicfocus.com·1d
🚨Incident Response
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem
arxiv.org·16h
🕵️Steganographic Compression
Scaling AI through our global network footprint
blog.arelion.com·13h
🕸️Mesh Networking
Preparing for the Post-Quantum Era: Best Practices for Federal Agencies
medium.com·8h
🔐Quantum Security
1500 Archers on a 28.8: Network Programming in Age of Empires and Beyond
gamedeveloper.com·1d·
Discuss: Hacker News
📡Network Archaeology
A Technical Deep Dive into My Network Reconnaissance Tool
dev.to·1d·
Discuss: DEV
🛣️BGP Hijacking
Researchers cracked the encryption used by DarkBit ransomware
securityaffairs.com·11h
🔐Archive Cryptanalysis
How to Stay a Step Ahead of a Non-Obvious Threat
darkreading.com·6h
🔓Hacking
Biometrics via Wi-Fi: Signal disruptions allow identification and monitoring
heise.de·2d
🏠Home Automation
Complex behaving Hardware with CircuitPython - Part I
hackster.io·5h
⚡Circuit Design
Compliant Contacts: Hacking Door Locks with Pen Springs
hackaday.com·1d
🎮Switch Archaeology
PlayReady Activation protocol issues (weak auth / fake client identities)
seclists.org·12h
🧪CBOR Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap