๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’พ Disk Utilities

dd Command, Imaging Tools, Forensic Recovery, Bit-level Access

Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5
synacktiv.comยท16hยท
Discuss: Lobsters, Hacker News
๐Ÿ”’Hardware Attestation
Police dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader
fortra.comยท13h
๐ŸขActive Directory
2025 MD-Series Q2 Release Note Highlights
forensicfocus.comยท17h
โš–๏ธDigital Evidence
Checking data integrity
eclecticlight.coยท21h
โœ…Checksum Validation
Hardware/Tools I Find Most Useful In My Lab
reddit.comยท7hยท
Discuss: r/homelab
๐Ÿ Homelab
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.toยท12hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Intent, Not Tools, Defines the Discipline
brettshavers.comยท6h
๐Ÿ•ณ๏ธInformation Leakage
Rescuezilla 2.6.1 Released with Ubuntu 25.04 Base
linuxiac.comยท4h
๐Ÿ› ๏ธGreaseweazle
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท13h
๐ŸบKerberos Archaeology
Microsoft is named a Leader in the 2025 Gartnerยฎ Magic Quadrantโ„ข for Endpoint Protection Platforms
microsoft.comยท10h
๐ŸบKerberos Archaeology
Enough unix to get by
thoughtbot.comยท3d
๐Ÿ“Shell Parsing
Show HN: Ggc โ€“ A terminal-based Git CLI written in Go
github.comยท13hยท
Discuss: Hacker News
๐ŸชŸAwesome windows command-line
ZFS Summer Article Roundup: Smart Hardware Advice
klarasystems.comยท10h
๐Ÿ’ฟZFS Internals
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comยท1d
โ„Nix
Elite 'Matanbuchus 3.0' Loader Spruces Up Ransomware Infections
darkreading.comยท7h
๐Ÿ”“Hacking
Forensic journey: Breaking down the UserAssist artifact structure
securelist.comยท2d
๐Ÿ”NTLM Archaeology
ControlPlane Local Privilege Escalation Vulnerability on macOS
blog.quarkslab.comยท2d
๐Ÿ‘‘RISC-V Privilege
Fileless DPAPI Credential Extraction With PowerShell
infosecwriteups.comยท2d
๐ŸŽฏNTLM Attacks
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท1d
โš–๏ธLegal Compliance
Google finds custom backdoor being installed on SonicWall network devices
arstechnica.comยท7h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap