๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿข Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

Intelligent Document Creation: Generate PDFs with AI in pdfAssistant.ai
pdfa.orgยท1d
๐Ÿ“„Document Digitization
Records management in a hyperscale digital world
thinkingrecords.co.ukยท14h
๐Ÿ“„Document Digitization
HPE Embraces Agentic AI and Signals a Power Shift in Enterprise Ops
avoa.comยท3h
๐Ÿ Homelab Orchestration
Encrypting identifiers in practice
sjoerdlangkemper.nlยท2d
๐ŸŒŠStream Ciphers
CapCut Con: Apple Phishing & Card-Stealing Refund Ruse
cofense.comยท1d
๐ŸŽซKerberos Attacks
AI, artisans and brainrot
blog.kronis.devยท1d
โšกIncremental Computation
Using Home Assistant, adguard home and an $8 smart outlet to avoid brain rot
romanklasen.comยท5dยท
Discuss: Hacker News
๐Ÿ Home Automation
What's coming to JavaScript
deno.comยท1dยท
Discuss: Hacker News
๐ŸŽฏGradual Typing
Deploying Pull Requests: A Complete AWS Stack for Every PR
metaduck.comยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
The Dark Side of Azure Identity & Access Management โ€“ 5 IAM & Entra ID Security Risks You Canโ€™t Ignore
blog.compass-security.comยท3d
๐Ÿ”“LDAP Injection
Understanding Redis Key Expiration: How Temporary Data Stays Under Control
dev.toยท7hยท
Discuss: DEV
โšกRedis Internals
Introducing Qodo Gen CLI: Build and Run Agents Anywhere in the SDLC
qodo.aiยท2dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
World SMB Day: Eight Network Tech Essentials Every Small Business Needs
blog.checkpoint.comยท14h
๐Ÿ•ธ๏ธMesh Networking
Governance | Cloud
dev.toยท2dยท
Discuss: DEV
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
darkreading.comยท12h
๐Ÿ›ก๏ธeBPF Security
The scourge of excessive AS-SETs
blog.apnic.netยท4d
๐ŸŒBGP Security
Lock It Down: Securing Your NGINX Site with `.htpasswd` and Ansible
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Network Automation
'IntelBroker' Suspect Arrested, Charged in High-Profile Breaches
darkreading.comยท1d
๐Ÿ”“Hacking
CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability
dev.toยท3dยท
Discuss: DEV
๐Ÿ”“Hacking
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap