🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Domain Enumeration

Active Directory Discovery, Network Reconnaissance, Security Assessment, LDAP Queries

Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·1d·
Discuss: www.blogger.com
🎯Threat Hunting
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·3h
🔓Password Cracking
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.com·1d·
Discuss: Hacker News
🔌Operating system internals
AzureStrike – Offensive Toolkit for Attacking Azure Active Directory Environments
darknet.org.uk·8h
🔒LDAP Security
LLM-Based Agents for Competitive Landscape Mapping in Drug Asset Due Diligence
arxiv.org·5h
🔍Information Retrieval
PowerDNS Authoritative Server 5.0 Released with BIND-Style Views
linuxiac.com·21h
📡DNS Archaeology
IoT under siege: The return of the Mirai-based Gayfemboy Botnet
securityaffairs.com·1d
🌐DNS Security
How are people monitoring their network for security and potential attacks?
reddit.com·8h·
Discuss: r/homelab
📡Network Monitoring
Some recent project milestones
markjgsmith.com·13h
🔌Interface Evolution
The IPv6 divide
blog.apnic.net·10h
🌐DNS over QUIC
ELA-1503-1 unbound security update
freexian.com·12h
🛡️eBPF Security
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·15h·
Discuss: Hacker News
🌐Network Security
OpenBSD Disables Yubikey OTP Support in -current
discoverbsd.com·2h
🔍eBPF
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.com·8h
🔓Hacking
Adaptive DDoS Mitigation via Hyper-Dimensional Signature Correlation & Dynamic Recursion
dev.to·23h·
Discuss: DEV
👁️Observatory Systems
The Science of Intelligent Exploration: Why We Need Exploration in AI
richardcsuwandi.github.io·1d·
Discuss: Hacker News
🔲Cellular Automata
5 Tiny Phrases Every Engineer Should Use With AI
read.highgrowthengineer.com·18h
⚡Proof Automation
Asking for feedback: building an automatic continuous deployment system
reddit.com·22h·
Discuss: r/kubernetes
📦Container Security
Zero Trust Revisited
systemsapproach.org·2h
🕸️Mesh Networks
How I Approach Performance Investigations – By Rico Mariani
ricomariani.medium.com·12h·
Discuss: Hacker News
🎯Performance Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap