🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
Smashing Security podcast #423: Operation Endgame, deepfakes, and dead slugs
grahamcluley.com·7h
🔓Hacking
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🏺Kerberos Archaeology
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
The complexity trap: why cybersecurity must be simplified
techradar.com·21h
🛡Cybersecurity
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·2d·
Discuss: Hacker News
🎯NTLM Attacks
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.org·2d
🛡Cybersecurity
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·22h
🔍NTLM Forensics
Comprehensive Research Tools for Infringement and Validity
dev.to·1d·
Discuss: DEV
⚡Proof Automation
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·2h
🔍BitFunnel
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·18h
🦠Malware Analysis
HarmonyOS Native Development Notes: 05-Things Beyond Development
dev.to·1d·
Discuss: DEV
🦋Format Metamorphosis
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes
dev.to·12h·
Discuss: DEV
🔌Interface Evolution
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.ai·1d·
Discuss: Hacker News
🤖Archive Automation
TLSNotary ― Flow Overview
dev.to·2d·
Discuss: DEV
🌐NetworkProtocols
Sender Policy Framework (SPF): How It Stops Email Spoofing
securityscorecard.com·1d
🌐NetworkProtocols
AIsecTest & Ψ AISysIndex: A New Frontier in AI Self-Awareness for Security
dev.to·16h·
Discuss: DEV
🎯Threat Hunting
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
securityscorecard.com·15h
🕵️Penetration Testing
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·2d
🦠Malware Analysis
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.org·2d
🔗Hash Chains
Loading...Loading more...
AboutBlogChangelogRoadmap