🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏢 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

MadeYouReset: Turning HTTP/2 Server Against Itself
imperva.com·9h·
Discuss: Lobsters, r/programming
🌐DNS Security
Patchday Microsoft: Attackers can become domain admins
heise.de·1d
🎫Kerberos Exploitation
Creating AI agent solutions for warehouse data access and security
engineering.fb.com·12h
🔐Capability Systems
Drug Cartels Are the New APTs
news.risky.biz·7h
🔓Hacking
Navigating the modern security stack
techradar.com·4h
🎯Threat Hunting
Securing Meta's Production PKI Credentials
usenix.org·1d
🎯NTLM Attacks
Why I Built DNSRedo.com and How It Solves the Domain Management Mess
dev.to·21h·
Discuss: DEV
📡DNS Archaeology
Global Domain Activity Trends Seen in Q2 2025
circleid.com·1d
🕵️Domain Enumeration
U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·10h
🔓Hacking
Show HN: Enter your domain and my open-source agent will hack it
github.com·2d·
Discuss: Hacker News, r/SoftwareEngineering
🎫Kerberos Exploitation
Wondering if this Minecraft server and personal website setup makes sense
reddit.com·3h·
Discuss: r/homelab
🏠Homelab Federation
Norton VPN review: A VPN that fails to meet Norton's standards
engadget.com·17h
🌐DNS Security
A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
unit42.paloaltonetworks.com·51m
🦠Malware Analysis
Enterprise, Heal Thyself: Why Win-DDoS Reminds Us That Not All Threats Are External
corero.com·2d
🔓LDAP Injection
Entra & Azure Elevated Access Revisited
adsecurity.org·3d
🔓LDAP Injection
Mastering Nmap: The Ultimate Guide to Network Scanning and Vulnerability Detection
infosecwriteups.com·5h
🔍NTLM Forensics
Malicious JavaScript Injects Fullscreen Iframe On a WordPress Website
blog.sucuri.net·7h
🛡️WASM Security
Microsoft’s August 2025 Patch Tuesday Addresses 107 CVEs (CVE-2025-53779)
tenable.com·1d
🎫Kerberos Exploitation
Code Insight Expands to Uncover Risks Across the Software Supply Chain
blog.virustotal.com·2h·
Discuss: blog.virustotal.com
🦠Malware Analysis
Real-Time eBPF Intrusion Detection via Dynamic Kernel Graph Pruning & Anomaly Scoring
dev.to·5h·
Discuss: DEV
🔍eBPF
Loading...Loading more...
AboutBlogChangelogRoadmap