Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏢 Active Directory
LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23092
posts in
1.18
s
Active Directory Attacks Demystified: Pass-the-Hash (
PtH
), Pass-the-Ticket (
PtT
), and Beyond
blog.qualys.com
·
1h
🎯
NTLM Attacks
Adblock
Filter List
Fingerprinting
adbleed.eu
·
16h
·
Discuss:
Hacker News
🕵️
LDAP Enumeration
RFC
2182 - Selection and Operation of
Secondary
DNS Servers
datatracker.ietf.org
·
3h
🌐
DNS Security
Domain
Security Report: Are Global 2000 Companies Doing
Enough
on
Domain
Security?
circleid.com
·
2d
🌐
DNS Security
Nation-State Actors
Exploit
Notepad
++ Supply Chain
unit42.paloaltonetworks.com
·
10h
🛡️
eBPF Security
Vulnerabilities
in
zdir
3
sjoerdlangkemper.nl
·
1d
💣
ZIP Vulnerabilities
IPFire
Introduces Community-Driven
DBL
for Domain Blocking
linuxiac.com
·
19h
🌐
DNS Security
Capture the
Kerberos
Flag: Detecting
Kerberos
Anomalies
blog.nviso.eu
·
47m
🎫
Kerberos Exploitation
Forward to Hell? On
Misusing
Transparent DNS
Forwarders
For Amplification Attacks
labs.ripe.net
·
2h
🌐
DNS Security
Claude desktop extension can be
hijacked
to send out
malware
by a simple Google Calendar event
techradar.com
·
8h
🎫
Kerberos Exploitation
I
Asked
My AI to Find
Vulnerable
AI. It Found 2,442
infosecwriteups.com
·
4h
🔓
Hacking
DNS-PERSIST-01
; Handling Domain Control Validation in a short-lived
certificate
World
scotthelme.ghost.io
·
2d
🌐
DNS over QUIC
Show HN:
SubAnalyzer
subdomain
discovery and external attack surface map tool
subanalyzer.com
·
3d
·
Discuss:
Hacker News
🕵️
Domain Enumeration
Securing
Every
Identity
in the Age of AI
paloaltonetworks.com
·
18h
🔐
PKI Archaeology
Kaspersky
spam
and phishing report for 2025
securelist.com
·
23h
🎫
Kerberos Attacks
MUZZLE
: Adaptive Agentic Red-Teaming of Web Agents Against
Indirect
Prompt Injection Attacks
arxiv.org
·
1d
🎯
Threat Hunting
SolarWinds
Web Help Desk
Exploitation
elastic.co
·
2d
🎫
Kerberos Exploitation
How to Self-Host
OpenClaw
Securely
on a VPS: A Security-First Guide
dsebastien.net
·
2d
🖥️
Self-hosted Infrastructure
Ransomware
Gangs
Are
Teaming
Up. Security Leaders Need to Rethink Defense.
lmgsecurity.com
·
1d
🔓
Hacking
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
14h
🚨
Incident Response
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help