🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Encrypting identifiers in practice
sjoerdlangkemper.nl·19h
🌊Stream Ciphers
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🏺Kerberos Archaeology
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·9h
🎯Threat Hunting
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
What Is HTTPS and Why Is It Still Essential for Cybersecurity in 2025?
securityscorecard.com·1d
🌐Network Security
Detect Narrative Threats with AI Personas
askrally.com·2d·
Discuss: Hacker News
📡Feed Archaeology
The complexity trap: why cybersecurity must be simplified
techradar.com·16h
🛡Cybersecurity
4 Month Journey to Cissp – 2025
lampysecurity.com·11h·
Discuss: Hacker News
⚔️Lean Tactics
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.dev·1d·
Discuss: Hacker News
🎯NTLM Attacks
I Built an AI Copilot for Pentesting—Then Turned It Off
hackernoon.com·18h
📏Code Metrics
80% of Phishing Clues Are in the Header, PhishHound Finds Them with YAML Logic
infosecwriteups.com·1d
🎯Threat Hunting
Machine Learning Fundamentals: accuracy with python
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
Deep Dive into Info.plist Security Flags for Penetration Testing
dev.to·3d·
Discuss: DEV
💣ZIP Vulnerabilities
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·1d·
Discuss: Hacker News
🎯NTLM Attacks
Resilience assessment framework for cyber-physical distribution power system based on coordinated cyber-physical attacks under dynamic game
arxiv.org·20h
🤝Consensus Algorithms
Code-First Reliability in Payment Systems
news.alvaroduran.com·13h·
Discuss: Hacker News
🔄Reproducible Builds
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·1d
🔗Data Provenance
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.org·1d
🛡Cybersecurity
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·16h
🔍NTLM Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap