๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ  Homelab Pentesting

Network Segmentation, Internal Security, Infrastructure Testing, Red Team

Be the LetsEncrypt in your homelab with step-ca
jan.wildeboer.netยท1d
๐Ÿ Homelab Automation
Make AI write your API functional tests
dev.toยท20hยท
Discuss: DEV
โšกProof Automation
Rant - Homelab Creep and Increasing Complexity
reddit.comยท50mยท
Discuss: r/homelab
๐Ÿ Homelab Orchestration
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
tenable.comยท1h
๐Ÿ”“Hacking
How to Secure a Linux Server
github.comยท3hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCLI Security
Port Scanning with CLI tools: Telnet, Netcat and cURL
infosecwriteups.comยท10h
๐ŸŒNetwork Protocols
Refinery raid
blog.nviso.euยท3d
๐Ÿ“ฆContainer Security
This Week in Security: Spilling Tea, Rooting AIs, and Accusing of Backdoors
hackaday.comยท14m
๐Ÿ”“Hacking
Free Hacking Ebooks and Security Ebooks Download Links
blackmoreops.comยท1d
๐Ÿ”“Hacking
BSD Now 622: Interview with Mark Phillips - FreeBSD Foundation Insights
discoverbsd.comยท2h
๐Ÿ”ŒOperating system internals
In Search of Riches, Hackers Plant 4G-Enabled Raspberry Pi In Bank Network
it.slashdot.orgยท13h
๐Ÿ”“Hacking
Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines
aws.amazon.comยท16h
๐Ÿ”„Reproducible Builds
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
praetorian.comยท1d
๐ŸบKerberos Archaeology
Release Highlights: VMRay Platform 2025.3.0
vmray.comยท6h
๐ŸŽฌWebCodecs
BrainDamage โ€“ Payload Generator and Encrypted Shell Stager for Red Teams
darknet.org.ukยท13h
๐ŸŽซKerberos Exploitation
Launch HN: Gecko Security (YC F24) โ€“ AI That Finds Vulnerabilities in Code
news.ycombinator.comยท21hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Threat Analysis - Public Administration - May -> July of 2025
cstromblad.comยท1d
๐Ÿ•ต๏ธPenetration Testing
Beyond the Noise: How HackerOne Cuts Through the Noise in the Age of AI
hackerone.comยท1d
๐Ÿ”“Hacking
DICOM De-Identification via Hybrid AI and Rule-Based Framework for Scalable, Uncertainty-Aware Redaction
arxiv.orgยท10h
๐Ÿ”„Archival Workflows
Industrial control systems: Updates close malware loopholes
heise.deยท1d
๐Ÿ”Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap