Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏢 Active Directory
LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19431
posts in
186.1
ms
Active
Directory
Penetration
Testing
infosecwriteups.com
·
3d
🔒
LDAP Security
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
1d
🌐
DNS Security
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
·
15h
🔐
Capability Security
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
17h
🏺
Kerberos Archaeology
What is a
Parked
Domain
?
securityscorecard.com
·
3d
🕵️
Domain Enumeration
The Machine Majority:
Navigating
the Agentic
APT
in the 2026 Threat Landscape
dev.to
·
19h
·
Discuss:
DEV
🎯
Threat Hunting
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
1d
·
Discuss:
Hacker News
📦
Container Security
Record-breaking 31.4
Tbps
DDoS
attack hits in November 2025, stopped by Cloudflare
securityaffairs.com
·
1d
🌐
DNS Security
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
3d
·
Discuss:
DEV
🎫
Kerberos Attacks
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
19h
🎯
Threat Hunting
Experience improving
container/workload
security
configuration
reddit.com
·
1d
·
Discuss:
r/kubernetes
📦
Container Security
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
2d
🎫
Kerberos Exploitation
toborrm9/malicious
_extension_
sentry
: Malicious Extension Database
github.com
·
1d
·
Discuss:
Hacker News
🌐
WARC Forensics
A Consensus-Bayesian Framework for
Detecting
Malicious
Activity in Enterprise Directory Access Graphs
arxiv.org
·
2d
🕵️
LDAP Enumeration
Operant
AI targets ‘
shadow
’ AI agents with real-time security platform
thenewstack.io
·
23h
🎯
Threat Hunting
From
ALB
to Caddy - Our
Wandering
Path to Supporting Thousands of Domain Names
fusionauth.io
·
2d
·
Discuss:
Hacker News
🏠
Homelab Federation
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
2d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
Stop using 192.168.1.0/24: A
Contrarian
Guide to Home Network
Addressing
routerjockey.com
·
3d
🌐
DNS Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help