Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏢 Active Directory
LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19420
posts in
479.1
ms
Active
Directory
Penetration
Testing
infosecwriteups.com
·
3d
🔒
LDAP Security
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
1d
🌐
DNS Security
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
·
23h
🔐
Capability Security
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
1d
🏺
Kerberos Archaeology
What is a
Parked
Domain
?
securityscorecard.com
·
4d
🕵️
Domain Enumeration
The
Convergence
of Risk: 2026
Cybersecurity
Outlook
dev.to
·
6h
·
Discuss:
DEV
🛡
Cybersecurity
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
2d
·
Discuss:
Hacker News
📦
Container Security
Record-breaking 31.4
Tbps
DDoS
attack hits in November 2025, stopped by Cloudflare
securityaffairs.com
·
1d
🌐
DNS Security
Operant
AI targets ‘
shadow
’ AI agents with real-time security platform
thenewstack.io
·
1d
🎯
Threat Hunting
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
3d
·
Discuss:
DEV
🎫
Kerberos Attacks
Experience improving
container/workload
security
configuration
reddit.com
·
1d
·
Discuss:
r/kubernetes
📦
Container Security
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
1d
🎯
Threat Hunting
A Consensus-Bayesian Framework for
Detecting
Malicious
Activity in Enterprise Directory Access Graphs
arxiv.org
·
2d
🕵️
LDAP Enumeration
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
2d
🎫
Kerberos Exploitation
toborrm9/malicious
_extension_
sentry
: Malicious Extension Database
github.com
·
1d
·
Discuss:
Hacker News
🌐
WARC Forensics
From
ALB
to Caddy - Our
Wandering
Path to Supporting Thousands of Domain Names
fusionauth.io
·
2d
·
Discuss:
Hacker News
🏠
Homelab Federation
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
3d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
Your AI Agent Has No
Armor
: A Technical Security Analysis of
OpenClaw
dev.to
·
20h
·
Discuss:
DEV
🎫
Kerberos Exploitation
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help