🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏢 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

UFC 319 live: Chimaev vs Du Plessis start time, fight card, updates and results
the-independent.com·1d
📺yt-dlp
My third Airsoft game day and perhaps I am finally getting the hang of it
neilzone.co.uk·11h
🎯Threat Hunting
A week with Cursor Agent CLI
joshtronic.com·1d
🌳Incremental Parsing
Evilginx Pro 4.2 - Anti-phishing evasions and more!
breakdev.org·3d
🌐DNS Security
Norton VPN review: A VPN that fails to meet Norton's standards
engadget.com·4d
🌐DNS Security
Code Insight Expands to Uncover Risks Across the Software Supply Chain
blog.virustotal.com·3d·
Discuss: blog.virustotal.com
🦠Malware Analysis
Show HN: unsafehttp – tiny web server from scratch in C, running on an orange pi
unsafehttp.benren.au·1d·
Discuss: Hacker News
🌐Network Protocols
Ed25519 Support in Chrome: Making the Web Faster and Safer
ipfsfoundation.org·2d·
Discuss: Lobsters
🌐Web Standards
[R] Bing Search API is Retiring - What’s Your Next Move?
reddit.com·10h·
Discuss: r/MachineLearning
🔍BitFunnel
The SaaS competitor's agent is coming
blog.paid.ai·4d·
Discuss: Hacker News
🎫Kerberos History
Notes for August 11-17
taoofmac.com·12h
📻Homebrew Protocols
Weekly #33-2025:Patch Tuesday, AI & Careers, Core Fundamentals, Cloud Era
dev.to·1d·
Discuss: DEV
⚙️Proof Engineering
AWS IAM Permission Limit Management: Another Often Forgotten Layer of Security
hackernoon.com·3d
🔒WASM Capabilities
AI-powered phishing attacks are on the rise and getting smarter - here's how to stay safe
techradar.com·3d
🎯Threat Hunting
Advanced HTTP Request Smuggling (HRS) Exploitation Guide
infosecwriteups.com·2d
🛡️Security Headers
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System
usenix.org·4d
🛡️RISC-V Security
Security Flaws In Carmaker's Web Portal Let a Hacker Remotely Unlock Cars
it.slashdot.org·12h
🔓Hacking
Scalable Exon Skipping Optimization via Generative Network Pruning & Dynamic Reinforcement Learning
dev.to·20h·
Discuss: DEV
🧬Copy Number Variants
Dynamic Spectrum Allocation via Reinforcement Learning with Adaptive Constraints
dev.to·4h·
Discuss: DEV
🔲Cellular Automata
Windows Entra IDs can be bypassed worryingly easily - here's what we know
techradar.com·3d
🎯NTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap