🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏒 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

Thinking About Thinking
funcall.blogspot.comΒ·17hΒ·
Discuss: www.blogger.com
πŸ”—Constraint Handling
On the Frontlines of the World’s First Robot War
politico.comΒ·23hΒ·
Discuss: Hacker News
πŸ‡·πŸ‡ΊRussian Computing
Das Problem mit German Strings
polarsignals.comΒ·1dΒ·
Discuss: Lobsters, Hacker News, r/programming
βœ…Format Verification
From Bug Bounties to $100M Exit: The Bootstrapped Journey of AssetNote
valleyofdoubt.comΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Looking back at my transition from Windows to Linux in an anti-customer age
scottrlarson.comΒ·3dΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Lorecal: Platform for Finding Domain Experts
lorecal.comΒ·3dΒ·
Discuss: Hacker News
πŸŽ™οΈWhisper
Red Flags in Kubernetes Cluster β€” You Must know
blog.devops.devΒ·2d
πŸ“¦Container Security
Build an AI Agent with LangGraph
spin.atomicobject.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI Curation
CSPs - Part 1: How to (Almost) Always Win at Minesweeper
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”²Cellular Automata
Simulation Results of Distributed Fair Assignment and Rebalancing in Mobility‑On‑Demand
hackernoon.comΒ·2d
⚑Incremental Computation
Uncle Sam throws AI 'chili cook-off' to spice up healthcare fraud detection
theregister.comΒ·15h
πŸ”Vector Forensics
From Bullets to Polished Updates in Seconds
dev.toΒ·15hΒ·
Discuss: DEV
🐚Shell Automation
Build a Smart Search App with LangChain and PostgreSQL on Google Cloud
blog.devops.devΒ·2d
πŸŒ€Brotli Dictionary
The EU’s Cyber Resilience Act: Redefining Secure Software Development
devops.comΒ·1d
πŸ”“Open Source Software
Show HN: Open-source Go repo comparing DCA vs. Grid with reproducible backtests
github.comΒ·2dΒ·
Discuss: Hacker News, r/golang
πŸ”—Hash Chains
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blogΒ·2dΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸ”‘Cryptographic Protocols
Are we solving digital identity or revealing we've lost what we're proving?
syntheticauth.aiΒ·5dΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
National guard troops deployed in DC rake leaves and clear homeless camps
theguardian.comΒ·17h
πŸ›‘Cybersecurity
Is data-efficient learning feasible with quantum models?
arxiv.orgΒ·4h
βš›οΈQuantum Information
Stop Being a Replaceable Printer
dev.toΒ·23hΒ·
Discuss: DEV
πŸ”„Reproducible Builds
Loading...Loading more...
AboutBlogChangelogRoadmap