๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Domain Enumeration

Active Directory Discovery, Network Reconnaissance, Security Assessment, LDAP Queries

Interim Report Q2
msab.comยท14h
๐Ÿ”—Data Provenance
MX Linux 23.6 on a Nvidia-powered laptop, behold results!
dedoimedo.comยท8h
๐Ÿ–ฅ๏ธModern Terminals
Using runZero for M&A security due diligence
runzero.comยท4d
๐Ÿ”—Data Provenance
Fastly DDoS Protection: Customer-Validated Defense
fastly.comยท2d
๐Ÿ”eBPF
How Smart MSPs Sell with Compliance, Not Just Tools โ€“ With Dustin Bolander
heimdalsecurity.comยท2d
๐ŸŽฏThreat Hunting
Jaya Klara Brekke: โ€˜Know who runs your infrastructureโ€™
blog.okfn.orgยท2d
๐ŸŒNetwork Security
Intel QATlib 25.08 Brings Hugepages Support & Other Improvements
phoronix.comยท10h
๐Ÿ–ฅ๏ธModern CPU
The Problem of Hidden Dependencies
marcelsud.meยท3dยท
Discuss: Hacker News
๐Ÿ”—Dependency Resolution
Why You Should Care About Vendors Using AI Products, and How Bitsight Helps You Find Out
bitsight.comยท1d
๐Ÿ”—Supply Chain
My Experience With Claude Code After 2 Weeks of Adventures
sankalp.bearblog.devยท1dยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
Alphabet: Ultra Bullish Heading Into Q2 After OpenAI's Shift To Google Cloud
seekingalpha.comยท4h
๐Ÿ”BitFunnel
Cloudflare fesses up to config change that borked internet access for all
theregister.comยท2d
๐ŸŒDNS over QUIC
Introducing Ingress Replay Protection
fingerprint.comยท1d
๐ŸŽซKerberos Attacks
Chinese hackers breached National Guard to steal network configurations
bleepingcomputer.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Wix introduces a new tool to optimize sites for AI
techradar.comยท1d
๐Ÿ“ŠFeed Optimization
How to protect your router from being hacked and becoming a residential proxy | Kaspersky official blog
kaspersky.comยท2d
๐Ÿ”“Hacking
Post-Quantum Cryptography in Kubernetes
kubernetes.ioยท20h
๐Ÿ”Quantum Security
Introducing, my college dorm room setup
i.redd.itยท1dยท
Discuss: r/homelab
๐Ÿ Homelab
CRABS: A syntactic-semantic pincer strategy for bounding LLM interpretation of Python notebooks
arxiv.orgยท1d
๐Ÿ’ปProgramming languages
APIs Are Eating the Internetโ€”And Hackers Are Eating APIs
hackernoon.comยท2d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap