Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏢 Active Directory
LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28238
posts in
14.9
ms
Kerberoasting
and
BloodHound
: Two Attacks That Show Why Active Directory Is Hard to Defend
medium.com
·
2d
🎫
Kerberos Exploitation
Learning
Exploit
Active
Directory
medium.com
·
1d
🔓
LDAP Injection
How
LDAP
Works
growingswe.com
·
1d
·
Discuss:
Hacker News
🏢
LDAP Forensics
Microsoft warns of RAT delivered through
trojanized
gaming
utilities
securityaffairs.com
·
15h
🎫
Kerberos Exploitation
️How Anonymous
LDAP
Enumeration Led to AS-REP
Roasting
and Domain Compromise
infosecwriteups.com
·
1d
🎫
Kerberos Exploitation
Toxic
combinations
: when small signals add up to a security incident
blog.cloudflare.com
·
1d
·
Discuss:
Hacker News
🌐
DNS Security
Cisco,
NSA
Warn of Attacks Targeting Catalyst
SD-WAN
Zero Day
decipher.sc
·
2d
🌐
DNS Security
Regular Expression
Denial
of Service Induced by
Backreferences
arxiv.org
·
2d
🌐
DNS Security
Free business
directory
API for AI agents (
11M
+ businesses)
agentweb.live
·
1d
·
Discuss:
Hacker News
🌀
Brotli Internals
APT37
hackers use new malware to breach
air-gapped
networks
bleepingcomputer.com
·
1d
🔓
Hacking
This AI Agent Is
Designed
to Not Go
Rogue
wired.com
·
2d
🎯
Threat Hunting
Intego
X9: Why your macOS antivirus should not trust
PIDs
blog.quarkslab.com
·
3d
🔌
Operating system internals
Inside AWS Security Agent: A multi-agent architecture for
automated
penetration
testing
aws.amazon.com
·
2d
🕵️
Penetration Testing
Piano
teacher to Hollywood kids who
fled
country sentenced to 9 years for sex abuse
the-independent.com
·
51m
🏴☠️
Piracy
Hackers are
harnessing
AI to exploit security
flaws
faster than ever
techradar.com
·
2d
🔓
Hacking
Never Buy A .online
Domain
0xsid.com
·
3d
·
Discuss:
Hacker News
🌐
DNS Security
Corp
Website
infosecwriteups.com
·
1d
🛡
Cybersecurity
How to
understand
and avoid Advanced
Persistent
Threats
malwarebytes.com
·
2d
🎯
Threat Hunting
Spear-phishing
: how to stay safe and prevent advanced attacks against civil society
accessnow.org
·
3d
📡
Feed Security
Bot
Forensics
incoherency.co.uk
·
3d
🦠
Malware Analysis
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help