Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
@inversecos
inversecos.com
An inside look at NSA tactics, techniques and procedures from China's lens
inversecos.com
·
65w
·
Hacker News
,
inversecos.com
Understanding Tokens in Entra ID: A Comprehensive Guide
inversecos.com
·
87w
·
inversecos.com
Detecting Lateral Movement in Entra ID: Cross Tenant Synchronization
inversecos.com
·
87w
·
inversecos.com
Azure Command Line Forensics - Host Based Artifacts
inversecos.com
·
167w
·
inversecos.com
Detecting Fake Events in Azure Sign-in Logs
inversecos.com
·
175w
·
inversecos.com
How to Detect Malicious OAuth Device Code Phishing
inversecos.com
·
179w
·
inversecos.com
Recovering Cleared Browser History - Chrome Forensics
inversecos.com
·
186w
·
inversecos.com
How to Investigate Insider Threats (Forensic Methodology)
inversecos.com
·
188w
·
inversecos.com
Forensic Detection of Files Deleted via SDelete
inversecos.com
·
193w
·
inversecos.com
How to Detect OAuth Access Token Theft in Azure
inversecos.com
·
195w
·
inversecos.com
Detecting Linux Anti-Forensics: Timestomping
inversecos.com
·
198w
·
inversecos.com
Hunting for APT Abuse of Exchange
inversecos.com
·
200w
·
inversecos.com
Heap Overflows on iOS ARM64: Heap Spraying, Use-After-Free (Part 3)
inversecos.com
·
201w
·
inversecos.com
Detecting Linux Anti-Forensics Log Tampering
inversecos.com
·
204w
·
inversecos.com
Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains
inversecos.com
·
205w
·
inversecos.com
How to Reverse Engineer and Patch an iOS Application for Beginners: Part I
inversecos.com
·
206w
·
inversecos.com
How to Perform Clipboard Forensics: ActivitiesCache.db, Memory Forensics and Clipboard History
inversecos.com
·
208w
·
inversecos.com
Detection and Compromise: Azure Key Vaults & Secrets
inversecos.com
·
209w
·
inversecos.com
Defence Evasion Technique: Timestomping Detection – NTFS Forensics
inversecos.com
·
212w
·
inversecos.com
Malicious Registry Timestamp Manipulation Technique: Detecting Registry Timestomping
inversecos.com
·
215w
·
inversecos.com
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help