๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก malware analysis

threat intelligence, malware analysis, national security, nation state actors, apt, ttpsย 

Install Linters, Get Malware
c-b.ioยท23hยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Open source's superior security is a matter of eyeballs: Be kind to the brains behind them
theregister.comยท1hยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Applying the Six Thinking Hats Framework to Personal Data Security Analysis
guptadeepak.comยท16hยท
Discuss: Hacker News
๐Ÿ“กNetwork Protocol Analysis
Google Sues Operators of a 10 Million Device Android Set-Top Box Botnet
torrentfreak.comยท1dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Information Warfare
yuxi.mlยท1dยท
Discuss: Hacker News
๐Ÿ“กNetwork Protocol Analysis
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
techcrunch.comยท2dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
eslint-config-prettier Compromised: How npm Package with 30 Million Downloads Spread Malware
safedep.ioยท18hยท
Discuss: Hacker News, Hacker News, r/opensource, r/programming
๐Ÿ”reverse engineering
How to Invent Defense Products (2022)
vannevarlabs.comยท12hยท
Discuss: Hacker News
๐Ÿ”งIDA Pro
I extracted the system prompts from closed-source tools like Cursor & v0. The repo just hit 70k stars.
reddit.comยท1dยท
Discuss: r/LocalLLaMA
๐Ÿ”reverse engineering
Show HN: I'm a non-coder who turns 1-line intents into full-stack blueprints
news.ycombinator.comยท51mยท
Discuss: Hacker News
๐Ÿ”reverse engineering
As AI agents go mainstream, companies lean into confidential computing
computerworld.comยท17hยท
Discuss: Hacker News
๐Ÿ–ฅhomelab
Foreword for Fuzz Testing Book
pages.cs.wisc.eduยท2hยท
Discuss: Lobsters, Hacker News
๐Ÿ”reverse engineering
Dior begins sending data breach notifications to U.S. customers
bleepingcomputer.comยท21hยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Using leaked data to examine vulnerabilities in SMS routing and SS7 signalling
medium.comยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ“กNetwork Protocol Analysis
Detecting code copying at scale with Vendetect
blog.trailofbits.comยท1dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
UK uncovers novel Microsoft snooping malware, blames and sanctions GRU cyberspies
theregister.comยท2dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Microsoft Names Threat Actors
learn.microsoft.comยท4dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Portable Forensics with Toby: A Raspberry Pi Toolkit
bakerstreetforensics.comยท1dยท
Discuss: Hacker News
๐Ÿ”reverse engineering
"We Couldn't Generate an Answer for Your Question"
acrlog.orgยท28mยท
Discuss: Hacker News
๐Ÿ”reverse engineering
Weak password allowed hackers to sink a 158-year-old company
bbc.comยท1dยท
Discuss: Hacker News, r/privacy, r/technews
๐Ÿ“กNetwork Protocol Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap