🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏢 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

UFC 319 live: Chimaev vs Du Plessis start time, fight card, updates and results
the-independent.com·22h
📺yt-dlp
Open Security News week 33-2025
nocomplexity.com·2d
🔓Hacking
Code Insight Expands to Uncover Risks Across the Software Supply Chain
blog.virustotal.com·3d·
Discuss: blog.virustotal.com
🦠Malware Analysis
Malicious JavaScript Injects Fullscreen Iframe On a WordPress Website
blog.sucuri.net·3d
🛡️WASM Security
Show HN: unsafehttp – tiny web server from scratch in C, running on an orange pi
unsafehttp.benren.au·23h·
Discuss: Hacker News
🌐Network Protocols
[R] Bing Search API is Retiring - What’s Your Next Move?
reddit.com·3h·
Discuss: r/MachineLearning
🔍BitFunnel
The SaaS competitor's agent is coming
blog.paid.ai·4d·
Discuss: Hacker News
🎫Kerberos History
Accelerated SQL Query Optimization via Hybrid Evolutionary-Reinforcement Learning
dev.to·2d·
Discuss: DEV
🚀Query Optimization
The Bookmarklet Hack OpenAI Doesn’t Want You to Know About
hackernoon.com·2d
🔌Archive APIs
Protect Yourself From Data Breaches: Why You Should Use a Password Manager
hackernoon.com·1d
🔓Hacking
Notes for August 11-17
taoofmac.com·4h
📻Homebrew Protocols
Predicting Guest Churn via Dynamic Bayesian Network Calibration with Enhanced HyperScore
dev.to·21h·
Discuss: DEV
📊Feed Optimization
Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era
dev.to·16h·
Discuss: DEV
⚙️Proof Engineering
These scientists have a unique way of tackling video deepfakes - and all it takes is a burst of light
techradar.com·8h
💿Optical Forensics
AWS IAM Permission Limit Management: Another Often Forgotten Layer of Security
hackernoon.com·3d
🔒WASM Capabilities
AI-powered phishing attacks are on the rise and getting smarter - here's how to stay safe
techradar.com·3d
🎯Threat Hunting
Advanced HTTP Request Smuggling (HRS) Exploitation Guide
infosecwriteups.com·2d
🛡️Security Headers
Security Flaws In Carmaker's Web Portal Let a Hacker Remotely Unlock Cars
it.slashdot.org·4h
🔓Hacking
Scalable Exon Skipping Optimization via Generative Network Pruning & Dynamic Reinforcement Learning
dev.to·12h·
Discuss: DEV
🧬Copy Number Variants
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System
usenix.org·4d
🛡️RISC-V Security
Loading...Loading more...
AboutBlogChangelogRoadmap