🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

The AI Data Center’s New Perimeter: Wireless Security
bastille.net·4h
📊Homelab Monitoring
An effective automotive forensic technique utilizing various logs of Android-based In-vehicle infotainment systems
sciencedirect.com·2h
🔬Hardware Forensics
Normalisation of SWIFT Message Counterparties with Feature Extraction and Clustering
arxiv.org·1d
⚙️ABNF Mining
Inferno Part 2: Let's Make a Cluster
debu.gs·1d·
Discuss: Hacker News
🏠HomeLab
Taming The Three-Headed Dog -Kerberos Deep Dive Series
blog.compass-security.com·13h
🎫Kerberos Exploitation
Over 20 VPN apps with 700 million users found to have undisclosed links and security vulnerabilities
techradar.com·6h
🌐BGP Security
Book Review: "The Language of Deception"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
📼Cassette Hacking
1965 Cryptanalysis Training Workbook Released by the NSA
schneier.com·8h·
Discuss: Hacker News, www.schneier.com
🔐Cryptographic Archaeology
LLMs to Blaze a Trail
blogger.com·9h
💾Persistence Strategies
Hexstrike-AI: When LLMs Meet Zero-Day Exploitation
blog.checkpoint.com·57m
🤖Network Automation
ICS-OT-PLC CTF Challenge Write-Up: Solving the CISS2025 Stage-1 “Pass the Door of Durin”
pixelstech.net·17h
🎯Interactive Provers
Top 10 Cybersecurity Companies in Europe
heimdalsecurity.com·2h
🛡Cybersecurity
In the rush to adopt hot new tech, security is often forgotten. AI is no exception
theregister.com·14h·
Discuss: Hacker News
🛣️BGP Hijacking
RapperBot: From Infection to DDoS in a Split Second
bitsight.com·1h·
Discuss: Hacker News
🛣️BGP Hijacking
Discovering the Discovery of Designated Resolvers
labs.ripe.net·11h
🌐DNS Security
Introducing Dynamic API Scanning
blog.detectify.com·7h
📦Container Security
Rockchip RV1126B-P quad-core Cortex-A53 SoC shows up in AI Vision system-on-module
cnx-software.com·6h
🦾ARM Cortex-M
Digital platforms are now the ultimate political power brokers, with consequences for democracy
phys.org·6h
📡RSS Readers
Vulnerability Disclosure: Stealing Emails via Prompt Injections
insinuator.net·7h
📡Feed Security
I built a tiny message queue in Rust to learn the language - turned out surprisingly useful
reddit.com·6h·
Discuss: r/rust
🦀Rust Macros
Loading...Loading more...
AboutBlogChangelogRoadmap